{"url":"http://public2.vulnerablecode.io/api/packages/1049936?format=json","purl":"pkg:deb/debian/glibc@2.28-8","type":"deb","namespace":"debian","name":"glibc","version":"2.28-8","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"2.36-8","latest_non_vulnerable_version":"2.42-15","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43777?format=json","vulnerability_id":"VCID-13gq-1x22-skhy","summary":"Multiple vulnerabilities in glibc could result in Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27618.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27618.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27618","reference_id":"","reference_type":"","scores":[{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1686","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16877","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16952","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1701","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16985","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16939","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16881","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16817","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16819","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16849","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16753","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16736","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16701","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16567","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16686","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16792","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16756","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16794","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17028","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17082","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16863","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1893708","reference_id":"1893708","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1893708"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973914","reference_id":"973914","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973914"},{"reference_url":"https://security.archlinux.org/ASA-202102-16","reference_id":"ASA-202102-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202102-16"},{"reference_url":"https://security.archlinux.org/ASA-202102-17","reference_id":"ASA-202102-17","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202102-17"},{"reference_url":"https://security.archlinux.org/AVG-1320","reference_id":"AVG-1320","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1320"},{"reference_url":"https://security.gentoo.org/glsa/202107-07","reference_id":"GLSA-202107-07","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:14:58Z/"}],"url":"https://security.gentoo.org/glsa/202107-07"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210401-0006/","reference_id":"ntap-20210401-0006","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:14:58Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210401-0006/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1585","reference_id":"RHSA-2021:1585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1585"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21","reference_id":"show_bug.cgi?id=19519#c21","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:14:58Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=26224","reference_id":"show_bug.cgi?id=26224","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:14:58Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=26224"},{"reference_url":"https://usn.ubuntu.com/5310-1/","reference_id":"USN-5310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-1/"},{"reference_url":"https://usn.ubuntu.com/5768-1/","reference_id":"USN-5768-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5768-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049939?format=json","purl":"pkg:deb/debian/glibc@2.31-9","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2gmq-64e3-c7db"},{"vulnerability":"VCID-3hqs-jns2-puf2"},{"vulnerability":"VCID-6qa1-upks-g3dm"},{"vulnerability":"VCID-8p27-z2tz-4bbm"},{"vulnerability":"VCID-bcuy-bbxf-x7hy"},{"vulnerability":"VCID-bsue-bznw-1ffe"},{"vulnerability":"VCID-d5xx-af6p-2fhn"},{"vulnerability":"VCID-dqgn-fdxt-u3cc"},{"vulnerability":"VCID-ge24-a7a4-d3bn"},{"vulnerability":"VCID-gv4u-g36a-w3cf"},{"vulnerability":"VCID-nk5x-uhcf-7kan"},{"vulnerability":"VCID-sjav-8bub-eycz"},{"vulnerability":"VCID-wp18-zqr6-a3ag"},{"vulnerability":"VCID-xhcm-t8jb-ybfb"},{"vulnerability":"VCID-ys5d-7xgp-w7g5"},{"vulnerability":"VCID-zqx5-4rdk-1qa3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9"}],"aliases":["CVE-2020-27618"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-13gq-1x22-skhy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62168?format=json","vulnerability_id":"VCID-2gmq-64e3-c7db","summary":"Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23218.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23218.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23218","reference_id":"","reference_type":"","scores":[{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59462","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.5949","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59433","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59469","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59476","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.5946","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59505","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59447","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59398","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59439","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59453","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59561","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65785","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65815","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66967","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66886","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66912","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66885","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66934","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66947","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23218"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2042013","reference_id":"2042013","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2042013"},{"reference_url":"https://security.gentoo.org/glsa/202208-24","reference_id":"GLSA-202208-24","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:43Z/"}],"url":"https://security.gentoo.org/glsa/202208-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0896","reference_id":"RHSA-2022:0896","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0896"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=28768","reference_id":"show_bug.cgi?id=28768","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:43Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=28768"},{"reference_url":"https://usn.ubuntu.com/5310-1/","reference_id":"USN-5310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-1/"},{"reference_url":"https://usn.ubuntu.com/5310-2/","reference_id":"USN-5310-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050172?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3hqs-jns2-puf2"},{"vulnerability":"VCID-6qa1-upks-g3dm"},{"vulnerability":"VCID-bcuy-bbxf-x7hy"},{"vulnerability":"VCID-bsue-bznw-1ffe"},{"vulnerability":"VCID-d5xx-af6p-2fhn"},{"vulnerability":"VCID-gv4u-g36a-w3cf"},{"vulnerability":"VCID-sjav-8bub-eycz"},{"vulnerability":"VCID-xhcm-t8jb-ybfb"},{"vulnerability":"VCID-ys5d-7xgp-w7g5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u3"}],"aliases":["CVE-2022-23218"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2gmq-64e3-c7db"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43040?format=json","vulnerability_id":"VCID-3hqs-jns2-puf2","summary":"Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33599.json","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33599.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33599","reference_id":"","reference_type":"","scores":[{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.7018","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70102","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70116","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70094","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70141","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70157","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70165","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70153","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70196","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70205","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.7493","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74948","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74906","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74934","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.75001","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74958","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0087","scoring_system":"epss","scoring_elements":"0.75253","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0087","scoring_system":"epss","scoring_elements":"0.7526","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0087","scoring_system":"epss","scoring_elements":"0.75216","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0087","scoring_system":"epss","scoring_elements":"0.75256","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277202","reference_id":"2277202","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277202"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/07/22/5","reference_id":"5","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/07/22/5"},{"reference_url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005","reference_id":"GLIBC-SA-2024-0005","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/"}],"url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005"},{"reference_url":"https://security.gentoo.org/glsa/202405-17","reference_id":"GLSA-202405-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-17"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html","reference_id":"msg00026.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240524-0011/","reference_id":"ntap-20240524-0011","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240524-0011/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2799","reference_id":"RHSA-2024:2799","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2799"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3309","reference_id":"RHSA-2024:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3312","reference_id":"RHSA-2024:3312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3339","reference_id":"RHSA-2024:3339","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3339"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3344","reference_id":"RHSA-2024:3344","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3411","reference_id":"RHSA-2024:3411","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3411"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3423","reference_id":"RHSA-2024:3423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3464","reference_id":"RHSA-2024:3464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3588","reference_id":"RHSA-2024:3588","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4126","reference_id":"RHSA-2024:4126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4126"},{"reference_url":"https://usn.ubuntu.com/6804-1/","reference_id":"USN-6804-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6804-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995125?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-d5xx-af6p-2fhn"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-ys5d-7xgp-w7g5"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11"}],"aliases":["CVE-2024-33599"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3hqs-jns2-puf2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81840?format=json","vulnerability_id":"VCID-6kb1-yuq8-tfbs","summary":"glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19126.json","reference_id":"","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19126.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19126","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03238","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03129","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03135","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03124","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03174","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03134","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03158","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03194","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03199","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03204","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06399","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06388","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06327","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06337","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06277","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06369","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06412","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06404","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0631","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06344","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06321","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19126"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=25204","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=25204"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1774681","reference_id":"1774681","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1774681"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945250","reference_id":"945250","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945250"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x64:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x64:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x64:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19126","reference_id":"CVE-2019-19126","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1828","reference_id":"RHSA-2020:1828","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1828"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3861","reference_id":"RHSA-2020:3861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0949","reference_id":"RHSA-2021:0949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0949"},{"reference_url":"https://usn.ubuntu.com/4416-1/","reference_id":"USN-4416-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4416-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049939?format=json","purl":"pkg:deb/debian/glibc@2.31-9","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2gmq-64e3-c7db"},{"vulnerability":"VCID-3hqs-jns2-puf2"},{"vulnerability":"VCID-6qa1-upks-g3dm"},{"vulnerability":"VCID-8p27-z2tz-4bbm"},{"vulnerability":"VCID-bcuy-bbxf-x7hy"},{"vulnerability":"VCID-bsue-bznw-1ffe"},{"vulnerability":"VCID-d5xx-af6p-2fhn"},{"vulnerability":"VCID-dqgn-fdxt-u3cc"},{"vulnerability":"VCID-ge24-a7a4-d3bn"},{"vulnerability":"VCID-gv4u-g36a-w3cf"},{"vulnerability":"VCID-nk5x-uhcf-7kan"},{"vulnerability":"VCID-sjav-8bub-eycz"},{"vulnerability":"VCID-wp18-zqr6-a3ag"},{"vulnerability":"VCID-xhcm-t8jb-ybfb"},{"vulnerability":"VCID-ys5d-7xgp-w7g5"},{"vulnerability":"VCID-zqx5-4rdk-1qa3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9"}],"aliases":["CVE-2019-19126"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6kb1-yuq8-tfbs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62165?format=json","vulnerability_id":"VCID-6qa1-upks-g3dm","summary":"Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3999","reference_id":"","reference_type":"","scores":[{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.75031","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74805","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74806","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74841","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74855","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74879","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74858","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74849","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74885","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74892","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74883","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74919","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74926","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74929","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74936","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74963","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74987","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74959","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74978","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74835","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74808","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3999"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024637","reference_id":"2024637","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024637"},{"reference_url":"https://www.openwall.com/lists/oss-security/2022/01/24/4","reference_id":"4","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/"}],"url":"https://www.openwall.com/lists/oss-security/2022/01/24/4"},{"reference_url":"https://security.archlinux.org/AVG-1621","reference_id":"AVG-1621","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1621"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2021-3999","reference_id":"CVE-2021-3999","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2021-3999"},{"reference_url":"https://security-tracker.debian.org/tracker/CVE-2021-3999","reference_id":"CVE-2021-3999","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/"}],"url":"https://security-tracker.debian.org/tracker/CVE-2021-3999"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e","reference_id":"gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e"},{"reference_url":"https://security.gentoo.org/glsa/202208-24","reference_id":"GLSA-202208-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-24"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221104-0001/","reference_id":"ntap-20221104-0001","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221104-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0896","reference_id":"RHSA-2022:0896","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0896"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=28769","reference_id":"show_bug.cgi?id=28769","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=28769"},{"reference_url":"https://usn.ubuntu.com/5310-1/","reference_id":"USN-5310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-1/"},{"reference_url":"https://usn.ubuntu.com/5310-2/","reference_id":"USN-5310-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-2/"},{"reference_url":"https://usn.ubuntu.com/6762-1/","reference_id":"USN-6762-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6762-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050173?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3hqs-jns2-puf2"},{"vulnerability":"VCID-bcuy-bbxf-x7hy"},{"vulnerability":"VCID-bsue-bznw-1ffe"},{"vulnerability":"VCID-d5xx-af6p-2fhn"},{"vulnerability":"VCID-gv4u-g36a-w3cf"},{"vulnerability":"VCID-sjav-8bub-eycz"},{"vulnerability":"VCID-xhcm-t8jb-ybfb"},{"vulnerability":"VCID-ys5d-7xgp-w7g5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u5"}],"aliases":["CVE-2021-3999"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6qa1-upks-g3dm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61415?format=json","vulnerability_id":"VCID-75dc-1fd5-u3e2","summary":"Multiple vulnerabilities have been found in glibc, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9169.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9169.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9169","reference_id":"","reference_type":"","scores":[{"value":"0.04945","scoring_system":"epss","scoring_elements":"0.89727","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0708","scoring_system":"epss","scoring_elements":"0.91578","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0708","scoring_system":"epss","scoring_elements":"0.91541","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0708","scoring_system":"epss","scoring_elements":"0.91536","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0708","scoring_system":"epss","scoring_elements":"0.91544","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0708","scoring_system":"epss","scoring_elements":"0.91543","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0708","scoring_system":"epss","scoring_elements":"0.91555","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0708","scoring_system":"epss","scoring_elements":"0.91568","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0708","scoring_system":"epss","scoring_elements":"0.91586","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0708","scoring_system":"epss","scoring_elements":"0.91576","published_at":"2026-05-11T12:55:00Z"},{"value":"0.12135","scoring_system":"epss","scoring_elements":"0.93818","published_at":"2026-04-13T12:55:00Z"},{"value":"0.13732","scoring_system":"epss","scoring_elements":"0.94228","published_at":"2026-04-01T12:55:00Z"},{"value":"0.13732","scoring_system":"epss","scoring_elements":"0.94238","published_at":"2026-04-02T12:55:00Z"},{"value":"0.13732","scoring_system":"epss","scoring_elements":"0.94249","published_at":"2026-04-04T12:55:00Z"},{"value":"0.13732","scoring_system":"epss","scoring_elements":"0.9425","published_at":"2026-04-07T12:55:00Z"},{"value":"0.13732","scoring_system":"epss","scoring_elements":"0.94259","published_at":"2026-04-08T12:55:00Z"},{"value":"0.13732","scoring_system":"epss","scoring_elements":"0.94264","published_at":"2026-04-09T12:55:00Z"},{"value":"0.13732","scoring_system":"epss","scoring_elements":"0.94268","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9169"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169"},{"reference_url":"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140","reference_id":"","reference_type":"","scores":[],"url":"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140"},{"reference_url":"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142","reference_id":"","reference_type":"","scores":[],"url":"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10278","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10278"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190315-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190315-0002/"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=24114","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=24114"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=583dd860d5b833037175247230a328f0050dbfe9","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=583dd860d5b833037175247230a328f0050dbfe9"},{"reference_url":"https://support.f5.com/csp/article/K54823184","reference_id":"","reference_type":"","scores":[],"url":"https://support.f5.com/csp/article/K54823184"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2022.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"reference_url":"http://www.securityfocus.com/bid/107160","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/107160"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1684057","reference_id":"1684057","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1684057"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924612","reference_id":"924612","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924612"},{"reference_url":"https://security.archlinux.org/ASA-201911-3","reference_id":"ASA-201911-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201911-3"},{"reference_url":"https://security.archlinux.org/AVG-855","reference_id":"AVG-855","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-855"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9169","reference_id":"CVE-2019-9169","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9169"},{"reference_url":"https://security.gentoo.org/glsa/202006-04","reference_id":"GLSA-202006-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202006-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1585","reference_id":"RHSA-2021:1585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1585"},{"reference_url":"https://usn.ubuntu.com/4416-1/","reference_id":"USN-4416-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4416-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049937?format=json","purl":"pkg:deb/debian/glibc@2.28-10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-13gq-1x22-skhy"},{"vulnerability":"VCID-2gmq-64e3-c7db"},{"vulnerability":"VCID-3hqs-jns2-puf2"},{"vulnerability":"VCID-6kb1-yuq8-tfbs"},{"vulnerability":"VCID-6qa1-upks-g3dm"},{"vulnerability":"VCID-8p27-z2tz-4bbm"},{"vulnerability":"VCID-b6tp-a1qc-pfdw"},{"vulnerability":"VCID-bcuy-bbxf-x7hy"},{"vulnerability":"VCID-bsue-bznw-1ffe"},{"vulnerability":"VCID-d5xx-af6p-2fhn"},{"vulnerability":"VCID-dqgn-fdxt-u3cc"},{"vulnerability":"VCID-ge24-a7a4-d3bn"},{"vulnerability":"VCID-gv4u-g36a-w3cf"},{"vulnerability":"VCID-hj77-4nfx-fuaa"},{"vulnerability":"VCID-mqch-gxfq-zyhh"},{"vulnerability":"VCID-nk5x-uhcf-7kan"},{"vulnerability":"VCID-pyms-pya1-buck"},{"vulnerability":"VCID-sbzq-gp2e-v7fy"},{"vulnerability":"VCID-sjav-8bub-eycz"},{"vulnerability":"VCID-v96m-se3g-8ydp"},{"vulnerability":"VCID-vqyv-kf5w-vkch"},{"vulnerability":"VCID-wp18-zqr6-a3ag"},{"vulnerability":"VCID-xhcm-t8jb-ybfb"},{"vulnerability":"VCID-ys5d-7xgp-w7g5"},{"vulnerability":"VCID-zqx5-4rdk-1qa3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-10"}],"aliases":["CVE-2019-9169"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-75dc-1fd5-u3e2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43780?format=json","vulnerability_id":"VCID-8p27-z2tz-4bbm","summary":"Multiple vulnerabilities in glibc could result in Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33574.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33574.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-33574","reference_id":"","reference_type":"","scores":[{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30847","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30873","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30929","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30887","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30842","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30852","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30818","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30653","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30537","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30453","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30973","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3102","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30838","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30897","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30927","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.31944","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.31863","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.31849","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.31873","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.31935","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.31943","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-33574"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1965408","reference_id":"1965408","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1965408"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989147","reference_id":"989147","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989147"},{"reference_url":"https://security.archlinux.org/AVG-1621","reference_id":"AVG-1621","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1621"},{"reference_url":"https://security.gentoo.org/glsa/202107-07","reference_id":"GLSA-202107-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4358","reference_id":"RHSA-2021:4358","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4358"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050172?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3hqs-jns2-puf2"},{"vulnerability":"VCID-6qa1-upks-g3dm"},{"vulnerability":"VCID-bcuy-bbxf-x7hy"},{"vulnerability":"VCID-bsue-bznw-1ffe"},{"vulnerability":"VCID-d5xx-af6p-2fhn"},{"vulnerability":"VCID-gv4u-g36a-w3cf"},{"vulnerability":"VCID-sjav-8bub-eycz"},{"vulnerability":"VCID-xhcm-t8jb-ybfb"},{"vulnerability":"VCID-ys5d-7xgp-w7g5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u3"}],"aliases":["CVE-2021-33574"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8p27-z2tz-4bbm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59737?format=json","vulnerability_id":"VCID-b6tp-a1qc-pfdw","summary":"Multiple vulnerabilities have been found in glibc, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6096.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6096.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6096","reference_id":"","reference_type":"","scores":[{"value":"0.01904","scoring_system":"epss","scoring_elements":"0.8318","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01904","scoring_system":"epss","scoring_elements":"0.83283","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01904","scoring_system":"epss","scoring_elements":"0.83282","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01904","scoring_system":"epss","scoring_elements":"0.83245","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01904","scoring_system":"epss","scoring_elements":"0.83196","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01904","scoring_system":"epss","scoring_elements":"0.8325","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01904","scoring_system":"epss","scoring_elements":"0.83256","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01904","scoring_system":"epss","scoring_elements":"0.8324","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01904","scoring_system":"epss","scoring_elements":"0.83233","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01904","scoring_system":"epss","scoring_elements":"0.8321","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01904","scoring_system":"epss","scoring_elements":"0.83208","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0449","scoring_system":"epss","scoring_elements":"0.89217","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0449","scoring_system":"epss","scoring_elements":"0.89128","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0449","scoring_system":"epss","scoring_elements":"0.89146","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0449","scoring_system":"epss","scoring_elements":"0.89152","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0449","scoring_system":"epss","scoring_elements":"0.89157","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0449","scoring_system":"epss","scoring_elements":"0.89165","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0449","scoring_system":"epss","scoring_elements":"0.89181","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0449","scoring_system":"epss","scoring_elements":"0.89192","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0449","scoring_system":"epss","scoring_elements":"0.89188","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0449","scoring_system":"epss","scoring_elements":"0.89198","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/"}],"url":"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=25620","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=25620"},{"reference_url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/"}],"url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1820331","reference_id":"1820331","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1820331"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961452","reference_id":"961452","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961452"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6096","reference_id":"CVE-2020-6096","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6096"},{"reference_url":"https://security.gentoo.org/glsa/202101-20","reference_id":"GLSA-202101-20","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/"}],"url":"https://security.gentoo.org/glsa/202101-20"},{"reference_url":"https://usn.ubuntu.com/4954-1/","reference_id":"USN-4954-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4954-1/"},{"reference_url":"https://usn.ubuntu.com/5310-1/","reference_id":"USN-5310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049939?format=json","purl":"pkg:deb/debian/glibc@2.31-9","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2gmq-64e3-c7db"},{"vulnerability":"VCID-3hqs-jns2-puf2"},{"vulnerability":"VCID-6qa1-upks-g3dm"},{"vulnerability":"VCID-8p27-z2tz-4bbm"},{"vulnerability":"VCID-bcuy-bbxf-x7hy"},{"vulnerability":"VCID-bsue-bznw-1ffe"},{"vulnerability":"VCID-d5xx-af6p-2fhn"},{"vulnerability":"VCID-dqgn-fdxt-u3cc"},{"vulnerability":"VCID-ge24-a7a4-d3bn"},{"vulnerability":"VCID-gv4u-g36a-w3cf"},{"vulnerability":"VCID-nk5x-uhcf-7kan"},{"vulnerability":"VCID-sjav-8bub-eycz"},{"vulnerability":"VCID-wp18-zqr6-a3ag"},{"vulnerability":"VCID-xhcm-t8jb-ybfb"},{"vulnerability":"VCID-ys5d-7xgp-w7g5"},{"vulnerability":"VCID-zqx5-4rdk-1qa3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9"}],"aliases":["CVE-2020-6096"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b6tp-a1qc-pfdw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43041?format=json","vulnerability_id":"VCID-bcuy-bbxf-x7hy","summary":"Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33600.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33600.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33600","reference_id":"","reference_type":"","scores":[{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45261","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.4522","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45242","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45185","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.4524","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45229","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45231","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45282","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45276","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53791","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53828","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.5373","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.53774","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54555","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54534","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54576","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.5454","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58446","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58378","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277204","reference_id":"2277204","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277204"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/07/22/5","reference_id":"5","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/07/22/5"},{"reference_url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0006","reference_id":"GLIBC-SA-2024-0006","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/"}],"url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0006"},{"reference_url":"https://security.gentoo.org/glsa/202405-17","reference_id":"GLSA-202405-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-17"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html","reference_id":"msg00026.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240524-0013/","reference_id":"ntap-20240524-0013","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240524-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2799","reference_id":"RHSA-2024:2799","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2799"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3309","reference_id":"RHSA-2024:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3312","reference_id":"RHSA-2024:3312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3339","reference_id":"RHSA-2024:3339","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3339"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3344","reference_id":"RHSA-2024:3344","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3411","reference_id":"RHSA-2024:3411","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3411"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3423","reference_id":"RHSA-2024:3423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3464","reference_id":"RHSA-2024:3464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3588","reference_id":"RHSA-2024:3588","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4126","reference_id":"RHSA-2024:4126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4126"},{"reference_url":"https://usn.ubuntu.com/6804-1/","reference_id":"USN-6804-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6804-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995125?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-d5xx-af6p-2fhn"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-ys5d-7xgp-w7g5"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11"}],"aliases":["CVE-2024-33600"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bcuy-bbxf-x7hy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43042?format=json","vulnerability_id":"VCID-bsue-bznw-1ffe","summary":"Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33601.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33601.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33601","reference_id":"","reference_type":"","scores":[{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28479","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28523","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28566","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28367","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28433","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28476","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28436","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28387","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28401","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28379","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33729","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.3451","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34618","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34852","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34598","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.40823","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.40728","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.40808","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45358","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00228","scoring_system":"epss","scoring_elements":"0.45434","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277205","reference_id":"2277205","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277205"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/07/22/5","reference_id":"5","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/07/22/5"},{"reference_url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007","reference_id":"GLIBC-SA-2024-0007","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/"}],"url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007"},{"reference_url":"https://security.gentoo.org/glsa/202405-17","reference_id":"GLSA-202405-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-17"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html","reference_id":"msg00026.html","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240524-0014/","reference_id":"ntap-20240524-0014","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240524-0014/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2799","reference_id":"RHSA-2024:2799","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2799"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3309","reference_id":"RHSA-2024:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3312","reference_id":"RHSA-2024:3312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3339","reference_id":"RHSA-2024:3339","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3339"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3344","reference_id":"RHSA-2024:3344","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3411","reference_id":"RHSA-2024:3411","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3411"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3423","reference_id":"RHSA-2024:3423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3464","reference_id":"RHSA-2024:3464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3588","reference_id":"RHSA-2024:3588","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4126","reference_id":"RHSA-2024:4126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4126"},{"reference_url":"https://usn.ubuntu.com/6804-1/","reference_id":"USN-6804-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6804-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995125?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-d5xx-af6p-2fhn"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-ys5d-7xgp-w7g5"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11"}],"aliases":["CVE-2024-33601"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bsue-bznw-1ffe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43044?format=json","vulnerability_id":"VCID-d5xx-af6p-2fhn","summary":"Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4802.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4802.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-4802","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13253","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13233","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12907","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13061","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1314","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13131","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1316","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13319","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13117","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13198","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13249","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13218","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13181","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13129","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13031","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13033","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1313","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13135","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13105","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13003","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-4802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4802"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2367468","reference_id":"2367468","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2367468"},{"reference_url":"https://security.gentoo.org/glsa/202509-04","reference_id":"GLSA-202509-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202509-04"},{"reference_url":"https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e","reference_id":"?id=1e18586c5820e329f741d5c710275e165581380e","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-20T13:47:23Z/"}],"url":"https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10219","reference_id":"RHSA-2025:10219","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10219"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10220","reference_id":"RHSA-2025:10220","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10220"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10294","reference_id":"RHSA-2025:10294","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10294"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11487","reference_id":"RHSA-2025:11487","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11487"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8655","reference_id":"RHSA-2025:8655","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8655"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8686","reference_id":"RHSA-2025:8686","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8686"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9028","reference_id":"RHSA-2025:9028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9336","reference_id":"RHSA-2025:9336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9336"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9725","reference_id":"RHSA-2025:9725","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9725"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9750","reference_id":"RHSA-2025:9750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9750"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32976","reference_id":"show_bug.cgi?id=32976","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-20T13:47:23Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32976"},{"reference_url":"https://usn.ubuntu.com/7541-1/","reference_id":"USN-7541-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7541-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995126?format=json","purl":"pkg:deb/debian/glibc@2.36-8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-8"}],"aliases":["CVE-2025-4802"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d5xx-af6p-2fhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43779?format=json","vulnerability_id":"VCID-dqgn-fdxt-u3cc","summary":"Multiple vulnerabilities in glibc could result in Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3326.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3326.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3326","reference_id":"","reference_type":"","scores":[{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.3815","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38471","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38073","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38631","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38494","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38607","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.3805","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38137","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38127","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38057","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38171","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38263","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38288","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38447","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38548","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38501","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38527","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38565","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38554","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38545","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3326"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1921916","reference_id":"1921916","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1921916"},{"reference_url":"http://www.openwall.com/lists/oss-security/2021/01/28/2","reference_id":"2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/"}],"url":"http://www.openwall.com/lists/oss-security/2021/01/28/2"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981198","reference_id":"981198","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981198"},{"reference_url":"https://security.archlinux.org/ASA-202102-16","reference_id":"ASA-202102-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202102-16"},{"reference_url":"https://security.archlinux.org/ASA-202102-17","reference_id":"ASA-202102-17","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202102-17"},{"reference_url":"https://security.archlinux.org/AVG-1320","reference_id":"AVG-1320","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1320"},{"reference_url":"https://security.gentoo.org/glsa/202107-07","reference_id":"GLSA-202107-07","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/"}],"url":"https://security.gentoo.org/glsa/202107-07"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210304-0007/","reference_id":"ntap-20210304-0007","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210304-0007/"},{"reference_url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=7d88c6142c6efc160c0ee5e4f85cde382c072888","reference_id":"?p=glibc.git%3Ba=commit%3Bh=7d88c6142c6efc160c0ee5e4f85cde382c072888","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/"}],"url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=7d88c6142c6efc160c0ee5e4f85cde382c072888"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1585","reference_id":"RHSA-2021:1585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1585"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=27256","reference_id":"show_bug.cgi?id=27256","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=27256"},{"reference_url":"https://usn.ubuntu.com/5310-1/","reference_id":"USN-5310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-1/"},{"reference_url":"https://usn.ubuntu.com/5699-1/","reference_id":"USN-5699-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5699-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050169?format=json","purl":"pkg:deb/debian/glibc@2.31-11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2gmq-64e3-c7db"},{"vulnerability":"VCID-3hqs-jns2-puf2"},{"vulnerability":"VCID-6qa1-upks-g3dm"},{"vulnerability":"VCID-8p27-z2tz-4bbm"},{"vulnerability":"VCID-bcuy-bbxf-x7hy"},{"vulnerability":"VCID-bsue-bznw-1ffe"},{"vulnerability":"VCID-d5xx-af6p-2fhn"},{"vulnerability":"VCID-ge24-a7a4-d3bn"},{"vulnerability":"VCID-gv4u-g36a-w3cf"},{"vulnerability":"VCID-nk5x-uhcf-7kan"},{"vulnerability":"VCID-sjav-8bub-eycz"},{"vulnerability":"VCID-wp18-zqr6-a3ag"},{"vulnerability":"VCID-xhcm-t8jb-ybfb"},{"vulnerability":"VCID-ys5d-7xgp-w7g5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-11"}],"aliases":["CVE-2021-3326"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dqgn-fdxt-u3cc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62166?format=json","vulnerability_id":"VCID-ge24-a7a4-d3bn","summary":"Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35942","reference_id":"","reference_type":"","scores":[{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78075","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78113","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78083","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78096","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78123","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78128","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78154","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01598","scoring_system":"epss","scoring_elements":"0.81763","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01598","scoring_system":"epss","scoring_elements":"0.81802","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01598","scoring_system":"epss","scoring_elements":"0.8188","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01598","scoring_system":"epss","scoring_elements":"0.81688","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01598","scoring_system":"epss","scoring_elements":"0.81682","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01598","scoring_system":"epss","scoring_elements":"0.8172","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01598","scoring_system":"epss","scoring_elements":"0.81723","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01598","scoring_system":"epss","scoring_elements":"0.81748","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01598","scoring_system":"epss","scoring_elements":"0.81757","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01598","scoring_system":"epss","scoring_elements":"0.8178","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01598","scoring_system":"epss","scoring_elements":"0.81826","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01598","scoring_system":"epss","scoring_elements":"0.81823","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01598","scoring_system":"epss","scoring_elements":"0.81839","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35942"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1977975","reference_id":"1977975","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1977975"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990542","reference_id":"990542","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990542"},{"reference_url":"https://security.archlinux.org/AVG-1621","reference_id":"AVG-1621","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1621"},{"reference_url":"https://security.gentoo.org/glsa/202208-24","reference_id":"GLSA-202208-24","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/"}],"url":"https://security.gentoo.org/glsa/202208-24"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210827-0005/","reference_id":"ntap-20210827-0005","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210827-0005/"},{"reference_url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c","reference_id":"?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/"}],"url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4358","reference_id":"RHSA-2021:4358","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4358"},{"reference_url":"https://sourceware.org/glibc/wiki/Security%20Exceptions","reference_id":"Security%20Exceptions","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/"}],"url":"https://sourceware.org/glibc/wiki/Security%20Exceptions"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=28011","reference_id":"show_bug.cgi?id=28011","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=28011"},{"reference_url":"https://usn.ubuntu.com/5310-1/","reference_id":"USN-5310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-1/"},{"reference_url":"https://usn.ubuntu.com/5699-1/","reference_id":"USN-5699-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5699-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050170?format=json","purl":"pkg:deb/debian/glibc@2.31-13","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2gmq-64e3-c7db"},{"vulnerability":"VCID-3hqs-jns2-puf2"},{"vulnerability":"VCID-6qa1-upks-g3dm"},{"vulnerability":"VCID-8p27-z2tz-4bbm"},{"vulnerability":"VCID-bcuy-bbxf-x7hy"},{"vulnerability":"VCID-bsue-bznw-1ffe"},{"vulnerability":"VCID-d5xx-af6p-2fhn"},{"vulnerability":"VCID-gv4u-g36a-w3cf"},{"vulnerability":"VCID-nk5x-uhcf-7kan"},{"vulnerability":"VCID-sjav-8bub-eycz"},{"vulnerability":"VCID-wp18-zqr6-a3ag"},{"vulnerability":"VCID-xhcm-t8jb-ybfb"},{"vulnerability":"VCID-ys5d-7xgp-w7g5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13"}],"aliases":["CVE-2021-35942"],"risk_score":4.1,"exploitability":"0.5","weighted_severity":"8.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ge24-a7a4-d3bn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34316?format=json","vulnerability_id":"VCID-gv4u-g36a-w3cf","summary":"Multiple vulnerabilities in glibc could result in Local Privilege Escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4911.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4911.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4911","reference_id":"","reference_type":"","scores":[{"value":"0.59128","scoring_system":"epss","scoring_elements":"0.98223","published_at":"2026-04-04T12:55:00Z"},{"value":"0.59128","scoring_system":"epss","scoring_elements":"0.9822","published_at":"2026-04-02T12:55:00Z"},{"value":"0.62331","scoring_system":"epss","scoring_elements":"0.98371","published_at":"2026-04-26T12:55:00Z"},{"value":"0.67192","scoring_system":"epss","scoring_elements":"0.98577","published_at":"2026-05-07T12:55:00Z"},{"value":"0.67392","scoring_system":"epss","scoring_elements":"0.98577","published_at":"2026-04-24T12:55:00Z"},{"value":"0.67392","scoring_system":"epss","scoring_elements":"0.98574","published_at":"2026-04-21T12:55:00Z"},{"value":"0.67477","scoring_system":"epss","scoring_elements":"0.98584","published_at":"2026-04-29T12:55:00Z"},{"value":"0.71534","scoring_system":"epss","scoring_elements":"0.98751","published_at":"2026-05-14T12:55:00Z"},{"value":"0.71534","scoring_system":"epss","scoring_elements":"0.98746","published_at":"2026-05-09T12:55:00Z"},{"value":"0.71534","scoring_system":"epss","scoring_elements":"0.98747","published_at":"2026-05-11T12:55:00Z"},{"value":"0.71534","scoring_system":"epss","scoring_elements":"0.98749","published_at":"2026-05-12T12:55:00Z"},{"value":"0.72535","scoring_system":"epss","scoring_elements":"0.98763","published_at":"2026-04-07T12:55:00Z"},{"value":"0.72771","scoring_system":"epss","scoring_elements":"0.98771","published_at":"2026-04-08T12:55:00Z"},{"value":"0.74256","scoring_system":"epss","scoring_elements":"0.9884","published_at":"2026-04-13T12:55:00Z"},{"value":"0.74256","scoring_system":"epss","scoring_elements":"0.98844","published_at":"2026-04-16T12:55:00Z"},{"value":"0.74256","scoring_system":"epss","scoring_elements":"0.98845","published_at":"2026-04-18T12:55:00Z"},{"value":"0.74256","scoring_system":"epss","scoring_elements":"0.98837","published_at":"2026-04-09T12:55:00Z"},{"value":"0.74256","scoring_system":"epss","scoring_elements":"0.98839","published_at":"2026-04-12T12:55:00Z"},{"value":"0.74256","scoring_system":"epss","scoring_elements":"0.98858","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238352","reference_id":"2238352","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238352"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb","reference_id":"cpe:/a:redhat:rhel_eus:8.6::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.0::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:9::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos","reference_id":"cpe:/o:redhat:rhel_eus:8.6::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos","reference_id":"cpe:/o:redhat:rhel_eus:9.0::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8","reference_id":"cpe:/o:redhat:rhev_hypervisor:4.4::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8"},{"reference_url":"https://www.qualys.com/cve-2023-4911/","reference_id":"cve-2023-4911","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"}],"url":"https://www.qualys.com/cve-2023-4911/"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-4911","reference_id":"CVE-2023-4911","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-4911"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/52479.txt","reference_id":"CVE-2023-4911","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/52479.txt"},{"reference_url":"https://security.gentoo.org/glsa/202310-03","reference_id":"GLSA-202310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202310-03"},{"reference_url":"https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt","reference_id":"looney-tunables-local-privilege-escalation-glibc-ld-so.txt","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"}],"url":"https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5453","reference_id":"RHSA-2023:5453","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:5453"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5454","reference_id":"RHSA-2023:5454","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:5454"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5455","reference_id":"RHSA-2023:5455","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:5455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5476","reference_id":"RHSA-2023:5476","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:5476"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0033","reference_id":"RHSA-2024:0033","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0033"},{"reference_url":"https://usn.ubuntu.com/6409-1/","reference_id":"USN-6409-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6409-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995125?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-d5xx-af6p-2fhn"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-ys5d-7xgp-w7g5"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11"}],"aliases":["CVE-2023-4911"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gv4u-g36a-w3cf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59735?format=json","vulnerability_id":"VCID-hj77-4nfx-fuaa","summary":"Multiple vulnerabilities have been found in glibc, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29562.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29562.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29562","reference_id":"","reference_type":"","scores":[{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16125","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16215","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16193","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16131","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16149","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16186","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16076","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16074","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16035","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.15916","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16029","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16133","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16107","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16141","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16308","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.1637","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16169","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16255","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16319","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16301","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16261","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29562"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1905217","reference_id":"1905217","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1905217"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976391","reference_id":"976391","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976391"},{"reference_url":"https://security.archlinux.org/ASA-202102-16","reference_id":"ASA-202102-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202102-16"},{"reference_url":"https://security.archlinux.org/ASA-202102-17","reference_id":"ASA-202102-17","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202102-17"},{"reference_url":"https://security.archlinux.org/AVG-1320","reference_id":"AVG-1320","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1320"},{"reference_url":"https://security.gentoo.org/glsa/202101-20","reference_id":"GLSA-202101-20","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:13:36Z/"}],"url":"https://security.gentoo.org/glsa/202101-20"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210122-0004/","reference_id":"ntap-20210122-0004","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:13:36Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210122-0004/"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=26923","reference_id":"show_bug.cgi?id=26923","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:13:36Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=26923"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/","reference_id":"TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:13:36Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/"},{"reference_url":"https://usn.ubuntu.com/5310-1/","reference_id":"USN-5310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049939?format=json","purl":"pkg:deb/debian/glibc@2.31-9","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2gmq-64e3-c7db"},{"vulnerability":"VCID-3hqs-jns2-puf2"},{"vulnerability":"VCID-6qa1-upks-g3dm"},{"vulnerability":"VCID-8p27-z2tz-4bbm"},{"vulnerability":"VCID-bcuy-bbxf-x7hy"},{"vulnerability":"VCID-bsue-bznw-1ffe"},{"vulnerability":"VCID-d5xx-af6p-2fhn"},{"vulnerability":"VCID-dqgn-fdxt-u3cc"},{"vulnerability":"VCID-ge24-a7a4-d3bn"},{"vulnerability":"VCID-gv4u-g36a-w3cf"},{"vulnerability":"VCID-nk5x-uhcf-7kan"},{"vulnerability":"VCID-sjav-8bub-eycz"},{"vulnerability":"VCID-wp18-zqr6-a3ag"},{"vulnerability":"VCID-xhcm-t8jb-ybfb"},{"vulnerability":"VCID-ys5d-7xgp-w7g5"},{"vulnerability":"VCID-zqx5-4rdk-1qa3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9"}],"aliases":["CVE-2020-29562"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hj77-4nfx-fuaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61416?format=json","vulnerability_id":"VCID-mqch-gxfq-zyhh","summary":"Multiple vulnerabilities have been found in glibc, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10029.json","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10029.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10029","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12802","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.129","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1295","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12753","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12833","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12884","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1285","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12812","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12767","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1267","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12677","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15771","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15601","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15644","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15642","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15584","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15455","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15576","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15679","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15658","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15699","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10029"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1810670","reference_id":"1810670","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1810670"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953108","reference_id":"953108","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953108"},{"reference_url":"https://security.gentoo.org/glsa/202006-04","reference_id":"GLSA-202006-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202006-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4444","reference_id":"RHSA-2020:4444","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4444"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0348","reference_id":"RHSA-2021:0348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0949","reference_id":"RHSA-2021:0949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0949"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2998","reference_id":"RHSA-2021:2998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3315","reference_id":"RHSA-2021:3315","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3315"},{"reference_url":"https://usn.ubuntu.com/4416-1/","reference_id":"USN-4416-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4416-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049939?format=json","purl":"pkg:deb/debian/glibc@2.31-9","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2gmq-64e3-c7db"},{"vulnerability":"VCID-3hqs-jns2-puf2"},{"vulnerability":"VCID-6qa1-upks-g3dm"},{"vulnerability":"VCID-8p27-z2tz-4bbm"},{"vulnerability":"VCID-bcuy-bbxf-x7hy"},{"vulnerability":"VCID-bsue-bznw-1ffe"},{"vulnerability":"VCID-d5xx-af6p-2fhn"},{"vulnerability":"VCID-dqgn-fdxt-u3cc"},{"vulnerability":"VCID-ge24-a7a4-d3bn"},{"vulnerability":"VCID-gv4u-g36a-w3cf"},{"vulnerability":"VCID-nk5x-uhcf-7kan"},{"vulnerability":"VCID-sjav-8bub-eycz"},{"vulnerability":"VCID-wp18-zqr6-a3ag"},{"vulnerability":"VCID-xhcm-t8jb-ybfb"},{"vulnerability":"VCID-ys5d-7xgp-w7g5"},{"vulnerability":"VCID-zqx5-4rdk-1qa3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9"}],"aliases":["CVE-2020-10029"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mqch-gxfq-zyhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79939?format=json","vulnerability_id":"VCID-nk5x-uhcf-7kan","summary":"glibc: conversion from ISO-2022-JP-3 with iconv may emit spurious NUL character on state reset","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43396.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43396.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-43396","reference_id":"","reference_type":"","scores":[{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69557","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.6951","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69299","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69311","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69329","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69309","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69359","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69376","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69398","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69383","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69369","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69407","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69418","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69399","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.6945","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69458","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69463","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69441","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69483","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69517","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69486","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-43396"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43396","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43396"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2020652","reference_id":"2020652","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2020652"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=998622","reference_id":"998622","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=998622"},{"reference_url":"https://security.archlinux.org/AVG-1621","reference_id":"AVG-1621","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1621"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050172?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3hqs-jns2-puf2"},{"vulnerability":"VCID-6qa1-upks-g3dm"},{"vulnerability":"VCID-bcuy-bbxf-x7hy"},{"vulnerability":"VCID-bsue-bznw-1ffe"},{"vulnerability":"VCID-d5xx-af6p-2fhn"},{"vulnerability":"VCID-gv4u-g36a-w3cf"},{"vulnerability":"VCID-sjav-8bub-eycz"},{"vulnerability":"VCID-xhcm-t8jb-ybfb"},{"vulnerability":"VCID-ys5d-7xgp-w7g5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u3"}],"aliases":["CVE-2021-43396"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nk5x-uhcf-7kan"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61417?format=json","vulnerability_id":"VCID-pyms-pya1-buck","summary":"Multiple vulnerabilities have been found in glibc, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1751.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1751.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-1751","reference_id":"","reference_type":"","scores":[{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33535","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33687","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33719","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33558","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33601","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33634","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3363","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33589","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33566","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33599","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33575","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47717","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47732","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47714","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47723","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47669","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47585","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47651","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47673","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47615","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47644","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-1751"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1810719","reference_id":"1810719","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1810719"},{"reference_url":"https://security.gentoo.org/glsa/202006-04","reference_id":"GLSA-202006-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202006-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4444","reference_id":"RHSA-2020:4444","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4444"},{"reference_url":"https://usn.ubuntu.com/4416-1/","reference_id":"USN-4416-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4416-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049939?format=json","purl":"pkg:deb/debian/glibc@2.31-9","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2gmq-64e3-c7db"},{"vulnerability":"VCID-3hqs-jns2-puf2"},{"vulnerability":"VCID-6qa1-upks-g3dm"},{"vulnerability":"VCID-8p27-z2tz-4bbm"},{"vulnerability":"VCID-bcuy-bbxf-x7hy"},{"vulnerability":"VCID-bsue-bznw-1ffe"},{"vulnerability":"VCID-d5xx-af6p-2fhn"},{"vulnerability":"VCID-dqgn-fdxt-u3cc"},{"vulnerability":"VCID-ge24-a7a4-d3bn"},{"vulnerability":"VCID-gv4u-g36a-w3cf"},{"vulnerability":"VCID-nk5x-uhcf-7kan"},{"vulnerability":"VCID-sjav-8bub-eycz"},{"vulnerability":"VCID-wp18-zqr6-a3ag"},{"vulnerability":"VCID-xhcm-t8jb-ybfb"},{"vulnerability":"VCID-ys5d-7xgp-w7g5"},{"vulnerability":"VCID-zqx5-4rdk-1qa3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9"}],"aliases":["CVE-2020-1751"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pyms-pya1-buck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43776?format=json","vulnerability_id":"VCID-sbzq-gp2e-v7fy","summary":"Multiple vulnerabilities in glibc could result in Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-25013.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-25013.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-25013","reference_id":"","reference_type":"","scores":[{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74084","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.743","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74121","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74133","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74139","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74157","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74136","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74088","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.7409","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74244","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.7422","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74257","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74233","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74212","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74213","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74205","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.7417","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74179","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74171","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74116","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-25013"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1912960","reference_id":"1912960","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1912960"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/","reference_id":"4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979273","reference_id":"979273","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979273"},{"reference_url":"https://security.archlinux.org/ASA-202102-16","reference_id":"ASA-202102-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202102-16"},{"reference_url":"https://security.archlinux.org/ASA-202102-17","reference_id":"ASA-202102-17","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202102-17"},{"reference_url":"https://security.archlinux.org/AVG-1320","reference_id":"AVG-1320","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1320"},{"reference_url":"https://security.gentoo.org/glsa/202107-07","reference_id":"GLSA-202107-07","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/"}],"url":"https://security.gentoo.org/glsa/202107-07"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210205-0004/","reference_id":"ntap-20210205-0004","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210205-0004/"},{"reference_url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=ee7a3144c9922808181009b7b3e50e852fb4999b","reference_id":"?p=glibc.git%3Ba=commit%3Bh=ee7a3144c9922808181009b7b3e50e852fb4999b","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/"}],"url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=ee7a3144c9922808181009b7b3e50e852fb4999b"},{"reference_url":"https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f%40%3Cjira.kafka.apache.org%3E","reference_id":"r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f%40%3Cjira.kafka.apache.org%3E","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/"}],"url":"https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f%40%3Cjira.kafka.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7%40%3Cdev.kafka.apache.org%3E","reference_id":"r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7%40%3Cdev.kafka.apache.org%3E","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/"}],"url":"https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7%40%3Cdev.kafka.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2%40%3Cjira.kafka.apache.org%3E","reference_id":"r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2%40%3Cjira.kafka.apache.org%3E","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/"}],"url":"https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2%40%3Cjira.kafka.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9%40%3Cjira.kafka.apache.org%3E","reference_id":"r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9%40%3Cjira.kafka.apache.org%3E","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/"}],"url":"https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9%40%3Cjira.kafka.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff%40%3Cjira.kafka.apache.org%3E","reference_id":"r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff%40%3Cjira.kafka.apache.org%3E","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/"}],"url":"https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff%40%3Cjira.kafka.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece%40%3Cissues.zookeeper.apache.org%3E","reference_id":"r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece%40%3Cissues.zookeeper.apache.org%3E","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/"}],"url":"https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece%40%3Cissues.zookeeper.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc%40%3Cdev.zookeeper.apache.org%3E","reference_id":"r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc%40%3Cdev.zookeeper.apache.org%3E","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/"}],"url":"https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc%40%3Cdev.zookeeper.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c%40%3Cissues.zookeeper.apache.org%3E","reference_id":"rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c%40%3Cissues.zookeeper.apache.org%3E","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/"}],"url":"https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c%40%3Cissues.zookeeper.apache.org%3E"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0348","reference_id":"RHSA-2021:0348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0949","reference_id":"RHSA-2021:0949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0949"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1585","reference_id":"RHSA-2021:1585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1585"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=24973","reference_id":"show_bug.cgi?id=24973","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=24973"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/","reference_id":"TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/"},{"reference_url":"https://usn.ubuntu.com/5310-1/","reference_id":"USN-5310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-1/"},{"reference_url":"https://usn.ubuntu.com/5768-1/","reference_id":"USN-5768-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5768-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049939?format=json","purl":"pkg:deb/debian/glibc@2.31-9","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2gmq-64e3-c7db"},{"vulnerability":"VCID-3hqs-jns2-puf2"},{"vulnerability":"VCID-6qa1-upks-g3dm"},{"vulnerability":"VCID-8p27-z2tz-4bbm"},{"vulnerability":"VCID-bcuy-bbxf-x7hy"},{"vulnerability":"VCID-bsue-bznw-1ffe"},{"vulnerability":"VCID-d5xx-af6p-2fhn"},{"vulnerability":"VCID-dqgn-fdxt-u3cc"},{"vulnerability":"VCID-ge24-a7a4-d3bn"},{"vulnerability":"VCID-gv4u-g36a-w3cf"},{"vulnerability":"VCID-nk5x-uhcf-7kan"},{"vulnerability":"VCID-sjav-8bub-eycz"},{"vulnerability":"VCID-wp18-zqr6-a3ag"},{"vulnerability":"VCID-xhcm-t8jb-ybfb"},{"vulnerability":"VCID-ys5d-7xgp-w7g5"},{"vulnerability":"VCID-zqx5-4rdk-1qa3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9"}],"aliases":["CVE-2019-25013"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sbzq-gp2e-v7fy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43039?format=json","vulnerability_id":"VCID-sjav-8bub-eycz","summary":"Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2961.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2961.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2961","reference_id":"","reference_type":"","scores":[{"value":"0.91755","scoring_system":"epss","scoring_elements":"0.99689","published_at":"2026-04-21T12:55:00Z"},{"value":"0.91924","scoring_system":"epss","scoring_elements":"0.99704","published_at":"2026-05-12T12:55:00Z"},{"value":"0.91924","scoring_system":"epss","scoring_elements":"0.99703","published_at":"2026-05-09T12:55:00Z"},{"value":"0.91924","scoring_system":"epss","scoring_elements":"0.99706","published_at":"2026-05-14T12:55:00Z"},{"value":"0.91924","scoring_system":"epss","scoring_elements":"0.99701","published_at":"2026-04-29T12:55:00Z"},{"value":"0.91924","scoring_system":"epss","scoring_elements":"0.997","published_at":"2026-04-24T12:55:00Z"},{"value":"0.92156","scoring_system":"epss","scoring_elements":"0.9971","published_at":"2026-04-13T12:55:00Z"},{"value":"0.92156","scoring_system":"epss","scoring_elements":"0.99711","published_at":"2026-04-16T12:55:00Z"},{"value":"0.92156","scoring_system":"epss","scoring_elements":"0.99707","published_at":"2026-04-04T12:55:00Z"},{"value":"0.92156","scoring_system":"epss","scoring_elements":"0.99709","published_at":"2026-04-09T12:55:00Z"},{"value":"0.92156","scoring_system":"epss","scoring_elements":"0.99712","published_at":"2026-04-18T12:55:00Z"},{"value":"0.92578","scoring_system":"epss","scoring_elements":"0.99739","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2961"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/05/27/1","reference_id":"1","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/05/27/1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069191","reference_id":"1069191","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069191"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/04/24/2","reference_id":"2","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/04/24/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/05/27/2","reference_id":"2","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/05/27/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273404","reference_id":"2273404","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273404"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/05/27/3","reference_id":"3","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/05/27/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/04/18/4","reference_id":"4","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/04/18/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/05/27/4","reference_id":"4","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/05/27/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/05/27/5","reference_id":"5","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/05/27/5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/07/22/5","reference_id":"5","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/07/22/5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/05/27/6","reference_id":"6","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/05/27/6"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/04/17/9","reference_id":"9","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/04/17/9"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/","reference_id":"BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/"},{"reference_url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004","reference_id":"GLIBC-SA-2024-0004","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004"},{"reference_url":"https://security.gentoo.org/glsa/202405-17","reference_id":"GLSA-202405-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-17"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html","reference_id":"msg00001.html","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240531-0002/","reference_id":"ntap-20240531-0002","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240531-0002/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/","reference_id":"P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2722","reference_id":"RHSA-2024:2722","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2722"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2799","reference_id":"RHSA-2024:2799","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2799"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3269","reference_id":"RHSA-2024:3269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3309","reference_id":"RHSA-2024:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3312","reference_id":"RHSA-2024:3312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3339","reference_id":"RHSA-2024:3339","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3339"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3411","reference_id":"RHSA-2024:3411","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3411"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3423","reference_id":"RHSA-2024:3423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3464","reference_id":"RHSA-2024:3464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3588","reference_id":"RHSA-2024:3588","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4126","reference_id":"RHSA-2024:4126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7590","reference_id":"RHSA-2024:7590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7594","reference_id":"RHSA-2024:7594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7599","reference_id":"RHSA-2024:7599","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7599"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7939","reference_id":"RHSA-2024:7939","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7939"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8235","reference_id":"RHSA-2024:8235","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8235"},{"reference_url":"https://usn.ubuntu.com/6737-1/","reference_id":"USN-6737-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6737-1/"},{"reference_url":"https://usn.ubuntu.com/6737-2/","reference_id":"USN-6737-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6737-2/"},{"reference_url":"https://usn.ubuntu.com/6762-1/","reference_id":"USN-6762-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6762-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/","reference_id":"YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995125?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-d5xx-af6p-2fhn"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-ys5d-7xgp-w7g5"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11"}],"aliases":["CVE-2024-2961"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sjav-8bub-eycz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59733?format=json","vulnerability_id":"VCID-v96m-se3g-8ydp","summary":"Multiple vulnerabilities have been found in glibc, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10228.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10228.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10228","reference_id":"","reference_type":"","scores":[{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61384","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.6155","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61543","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61529","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61509","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61554","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61538","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61525","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.6154","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61535","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61461","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61489","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61459","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61507","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61522","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63371","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63231","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63289","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63315","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63276","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63328","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10228"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1428290","reference_id":"1428290","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1428290"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856503","reference_id":"856503","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856503"},{"reference_url":"https://security.gentoo.org/glsa/202101-20","reference_id":"GLSA-202101-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202101-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1585","reference_id":"RHSA-2021:1585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1585"},{"reference_url":"https://usn.ubuntu.com/5310-1/","reference_id":"USN-5310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-1/"},{"reference_url":"https://usn.ubuntu.com/5768-1/","reference_id":"USN-5768-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5768-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049939?format=json","purl":"pkg:deb/debian/glibc@2.31-9","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2gmq-64e3-c7db"},{"vulnerability":"VCID-3hqs-jns2-puf2"},{"vulnerability":"VCID-6qa1-upks-g3dm"},{"vulnerability":"VCID-8p27-z2tz-4bbm"},{"vulnerability":"VCID-bcuy-bbxf-x7hy"},{"vulnerability":"VCID-bsue-bznw-1ffe"},{"vulnerability":"VCID-d5xx-af6p-2fhn"},{"vulnerability":"VCID-dqgn-fdxt-u3cc"},{"vulnerability":"VCID-ge24-a7a4-d3bn"},{"vulnerability":"VCID-gv4u-g36a-w3cf"},{"vulnerability":"VCID-nk5x-uhcf-7kan"},{"vulnerability":"VCID-sjav-8bub-eycz"},{"vulnerability":"VCID-wp18-zqr6-a3ag"},{"vulnerability":"VCID-xhcm-t8jb-ybfb"},{"vulnerability":"VCID-ys5d-7xgp-w7g5"},{"vulnerability":"VCID-zqx5-4rdk-1qa3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9"}],"aliases":["CVE-2016-10228"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v96m-se3g-8ydp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59734?format=json","vulnerability_id":"VCID-vqyv-kf5w-vkch","summary":"Multiple vulnerabilities have been found in glibc, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1752.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1752.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-1752","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32529","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32946","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.328","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32687","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32603","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32464","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32528","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32537","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32441","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32462","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40495","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40511","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40442","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40543","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40521","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40548","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40469","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.4052","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40532","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40552","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40515","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-1752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1810718","reference_id":"1810718","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1810718"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953788","reference_id":"953788","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953788"},{"reference_url":"https://security.gentoo.org/glsa/202101-20","reference_id":"GLSA-202101-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202101-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4444","reference_id":"RHSA-2020:4444","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4444"},{"reference_url":"https://usn.ubuntu.com/4416-1/","reference_id":"USN-4416-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4416-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1049939?format=json","purl":"pkg:deb/debian/glibc@2.31-9","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2gmq-64e3-c7db"},{"vulnerability":"VCID-3hqs-jns2-puf2"},{"vulnerability":"VCID-6qa1-upks-g3dm"},{"vulnerability":"VCID-8p27-z2tz-4bbm"},{"vulnerability":"VCID-bcuy-bbxf-x7hy"},{"vulnerability":"VCID-bsue-bznw-1ffe"},{"vulnerability":"VCID-d5xx-af6p-2fhn"},{"vulnerability":"VCID-dqgn-fdxt-u3cc"},{"vulnerability":"VCID-ge24-a7a4-d3bn"},{"vulnerability":"VCID-gv4u-g36a-w3cf"},{"vulnerability":"VCID-nk5x-uhcf-7kan"},{"vulnerability":"VCID-sjav-8bub-eycz"},{"vulnerability":"VCID-wp18-zqr6-a3ag"},{"vulnerability":"VCID-xhcm-t8jb-ybfb"},{"vulnerability":"VCID-ys5d-7xgp-w7g5"},{"vulnerability":"VCID-zqx5-4rdk-1qa3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9"}],"aliases":["CVE-2020-1752"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vqyv-kf5w-vkch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62169?format=json","vulnerability_id":"VCID-wp18-zqr6-a3ag","summary":"Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23219.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23219.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23219","reference_id":"","reference_type":"","scores":[{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59462","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.5949","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59433","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59469","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59476","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.5946","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59505","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59447","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59398","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59439","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59453","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59561","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65785","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65815","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66967","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66886","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66912","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66885","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66934","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66947","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23219"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2042017","reference_id":"2042017","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2042017"},{"reference_url":"https://security.gentoo.org/glsa/202208-24","reference_id":"GLSA-202208-24","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:40Z/"}],"url":"https://security.gentoo.org/glsa/202208-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0896","reference_id":"RHSA-2022:0896","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0896"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22542","reference_id":"show_bug.cgi?id=22542","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:40Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22542"},{"reference_url":"https://usn.ubuntu.com/5310-1/","reference_id":"USN-5310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-1/"},{"reference_url":"https://usn.ubuntu.com/5310-2/","reference_id":"USN-5310-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050172?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3hqs-jns2-puf2"},{"vulnerability":"VCID-6qa1-upks-g3dm"},{"vulnerability":"VCID-bcuy-bbxf-x7hy"},{"vulnerability":"VCID-bsue-bznw-1ffe"},{"vulnerability":"VCID-d5xx-af6p-2fhn"},{"vulnerability":"VCID-gv4u-g36a-w3cf"},{"vulnerability":"VCID-sjav-8bub-eycz"},{"vulnerability":"VCID-xhcm-t8jb-ybfb"},{"vulnerability":"VCID-ys5d-7xgp-w7g5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u3"}],"aliases":["CVE-2022-23219"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wp18-zqr6-a3ag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43043?format=json","vulnerability_id":"VCID-xhcm-t8jb-ybfb","summary":"Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33602.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33602.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33602","reference_id":"","reference_type":"","scores":[{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63661","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63607","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63633","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63592","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63644","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63676","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.6366","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63627","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63664","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63673","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69871","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69902","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69898","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69948","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69827","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.70311","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.70319","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.70316","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.70258","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277206","reference_id":"2277206","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277206"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/07/22/5","reference_id":"5","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/07/22/5"},{"reference_url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0008","reference_id":"GLIBC-SA-2024-0008","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/"}],"url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0008"},{"reference_url":"https://security.gentoo.org/glsa/202405-17","reference_id":"GLSA-202405-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-17"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html","reference_id":"msg00026.html","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240524-0012/","reference_id":"ntap-20240524-0012","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240524-0012/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2799","reference_id":"RHSA-2024:2799","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2799"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3309","reference_id":"RHSA-2024:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3312","reference_id":"RHSA-2024:3312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3339","reference_id":"RHSA-2024:3339","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3339"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3344","reference_id":"RHSA-2024:3344","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3411","reference_id":"RHSA-2024:3411","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3411"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3423","reference_id":"RHSA-2024:3423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3464","reference_id":"RHSA-2024:3464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3588","reference_id":"RHSA-2024:3588","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4126","reference_id":"RHSA-2024:4126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4126"},{"reference_url":"https://usn.ubuntu.com/6804-1/","reference_id":"USN-6804-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6804-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995125?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-d5xx-af6p-2fhn"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-ys5d-7xgp-w7g5"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11"}],"aliases":["CVE-2024-33602"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xhcm-t8jb-ybfb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61864?format=json","vulnerability_id":"VCID-ys5d-7xgp-w7g5","summary":"A vulnerability has been discovered in glibc, which can lead to execution of arbitrary code..","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0395.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0395.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0395","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21846","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21643","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2174","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21798","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21808","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21768","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21711","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21718","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21685","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21423","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2149","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21575","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2155","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21572","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21899","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21664","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21942","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21929","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21955","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0395"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://sourceware.org/pipermail/libc-announce/2025/000044.html","reference_id":"000044.html","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/"}],"url":"https://sourceware.org/pipermail/libc-announce/2025/000044.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339460","reference_id":"2339460","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339460"},{"reference_url":"https://www.openwall.com/lists/oss-security/2025/01/22/4","reference_id":"4","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/"}],"url":"https://www.openwall.com/lists/oss-security/2025/01/22/4"},{"reference_url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2025-0001","reference_id":"GLIBC-SA-2025-0001","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/"}],"url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2025-0001"},{"reference_url":"https://security.gentoo.org/glsa/202505-06","reference_id":"GLSA-202505-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3828","reference_id":"RHSA-2025:3828","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3828"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4241","reference_id":"RHSA-2025:4241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4242","reference_id":"RHSA-2025:4242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4243","reference_id":"RHSA-2025:4243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4244","reference_id":"RHSA-2025:4244","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4244"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32582","reference_id":"show_bug.cgi?id=32582","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32582"},{"reference_url":"https://usn.ubuntu.com/7259-1/","reference_id":"USN-7259-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7259-1/"},{"reference_url":"https://usn.ubuntu.com/7259-2/","reference_id":"USN-7259-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7259-2/"},{"reference_url":"https://usn.ubuntu.com/7259-3/","reference_id":"USN-7259-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7259-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/995126?format=json","purl":"pkg:deb/debian/glibc@2.36-8","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-8"}],"aliases":["CVE-2025-0395"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ys5d-7xgp-w7g5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43778?format=json","vulnerability_id":"VCID-zqx5-4rdk-1qa3","summary":"Multiple vulnerabilities in glibc could result in Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27645.json","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27645.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-27645","reference_id":"","reference_type":"","scores":[{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11077","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11223","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11184","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11048","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11057","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11189","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11124","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11079","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11015","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10952","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.1109","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11162","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.1113","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11172","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.1122","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11283","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11096","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11176","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11232","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11242","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11209","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-27645"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1932589","reference_id":"1932589","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1932589"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/","reference_id":"7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983479","reference_id":"983479","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983479"},{"reference_url":"https://security.archlinux.org/AVG-1621","reference_id":"AVG-1621","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1621"},{"reference_url":"https://security.gentoo.org/glsa/202107-07","reference_id":"GLSA-202107-07","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/"}],"url":"https://security.gentoo.org/glsa/202107-07"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/","reference_id":"I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4358","reference_id":"RHSA-2021:4358","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4358"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=27462","reference_id":"show_bug.cgi?id=27462","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=27462"},{"reference_url":"https://usn.ubuntu.com/5310-1/","reference_id":"USN-5310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1050169?format=json","purl":"pkg:deb/debian/glibc@2.31-11","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2gmq-64e3-c7db"},{"vulnerability":"VCID-3hqs-jns2-puf2"},{"vulnerability":"VCID-6qa1-upks-g3dm"},{"vulnerability":"VCID-8p27-z2tz-4bbm"},{"vulnerability":"VCID-bcuy-bbxf-x7hy"},{"vulnerability":"VCID-bsue-bznw-1ffe"},{"vulnerability":"VCID-d5xx-af6p-2fhn"},{"vulnerability":"VCID-ge24-a7a4-d3bn"},{"vulnerability":"VCID-gv4u-g36a-w3cf"},{"vulnerability":"VCID-nk5x-uhcf-7kan"},{"vulnerability":"VCID-sjav-8bub-eycz"},{"vulnerability":"VCID-wp18-zqr6-a3ag"},{"vulnerability":"VCID-xhcm-t8jb-ybfb"},{"vulnerability":"VCID-ys5d-7xgp-w7g5"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-11"}],"aliases":["CVE-2021-27645"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zqx5-4rdk-1qa3"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-8"}