{"url":"http://public2.vulnerablecode.io/api/packages/1051188?format=json","purl":"pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1","type":"deb","namespace":"debian","name":"libextractor","version":"1:1.8-2+deb10u1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"1:1.11-2","latest_non_vulnerable_version":"1:1.11-2","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94047?format=json","vulnerability_id":"VCID-tubv-28uu-2uh8","summary":"GNU Libextractor through 1.9 has a heap-based buffer over-read in the function EXTRACTOR_dvi_extract_method in plugins/dvi_extractor.c.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15531","reference_id":"","reference_type":"","scores":[{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.7823","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78213","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78038","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78047","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78076","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78058","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78084","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78089","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78115","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78097","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78094","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78129","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78122","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78155","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78161","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78175","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01106","scoring_system":"epss","scoring_elements":"0.78188","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-15531"},{"reference_url":"https://bugs.gnunet.org/view.php?id=5846","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.gnunet.org/view.php?id=5846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15531"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/08/msg00038.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/08/msg00038.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/12/msg00016.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2021/12/msg00016.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DV5YBIS2UUNUUKQOEKDWUKEEWJIKWFMZ/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DV5YBIS2UUNUUKQOEKDWUKEEWJIKWFMZ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRQUHTSNOCKGRKPRXPUJ6FGTVZ2K5POL/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRQUHTSNOCKGRKPRXPUJ6FGTVZ2K5POL/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MUJWNWDGGXQLTNQNELKERJ7DLW7E22BK/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MUJWNWDGGXQLTNQNELKERJ7DLW7E22BK/"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935553","reference_id":"935553","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935553"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15531","reference_id":"CVE-2019-15531","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-15531"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1053036?format=json","purl":"pkg:deb/debian/libextractor@1:1.11-2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.11-2"}],"aliases":["CVE-2019-15531"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tubv-28uu-2uh8"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73738?format=json","vulnerability_id":"VCID-1xdm-2dj5-jkc7","summary":"security update","references":[{"reference_url":"http://lists.gnu.org/archive/html/bug-libextractor/2018-07/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.gnu.org/archive/html/bug-libextractor/2018-07/msg00000.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14347","reference_id":"","reference_type":"","scores":[{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68604","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68566","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68392","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68412","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68432","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68408","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68459","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68475","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68501","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68489","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68456","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68494","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68508","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68487","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68535","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68541","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68547","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00566","scoring_system":"epss","scoring_elements":"0.68524","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14347","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16430","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16430"},{"reference_url":"https://gnunet.org/bugs/view.php?id=5399","reference_id":"","reference_type":"","scores":[],"url":"https://gnunet.org/bugs/view.php?id=5399"},{"reference_url":"https://gnunet.org/git/libextractor.git/commit/?id=f033468cd36e2b8bf92d747fbd683b2ace8da394","reference_id":"","reference_type":"","scores":[],"url":"https://gnunet.org/git/libextractor.git/commit/?id=f033468cd36e2b8bf92d747fbd683b2ace8da394"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/08/msg00025.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/08/msg00025.html"},{"reference_url":"https://www.debian.org/security/2018/dsa-4290","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4290"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904905","reference_id":"904905","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904905"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-14347","reference_id":"CVE-2018-14347","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-14347"},{"reference_url":"https://usn.ubuntu.com/4641-1/","reference_id":"USN-4641-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4641-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037232?format=json","purl":"pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1xdm-2dj5-jkc7"},{"vulnerability":"VCID-2auw-wc6u-ekcs"},{"vulnerability":"VCID-3bg1-rwze-kuhw"},{"vulnerability":"VCID-5ymr-xk84-8uh3"},{"vulnerability":"VCID-ahs6-mesc-yqhm"},{"vulnerability":"VCID-bdsg-x852-wfgn"},{"vulnerability":"VCID-kpcg-4av4-gka8"},{"vulnerability":"VCID-kxcz-d7a4-77e8"},{"vulnerability":"VCID-tc8j-82se-qfbk"},{"vulnerability":"VCID-tubv-28uu-2uh8"},{"vulnerability":"VCID-x3k6-yrp9-9ud9"},{"vulnerability":"VCID-xyab-d3gr-zkdw"},{"vulnerability":"VCID-zd6d-q8xx-zud6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.3-4%252Bdeb9u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1051188?format=json","purl":"pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-tubv-28uu-2uh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1"}],"aliases":["CVE-2018-14347"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1xdm-2dj5-jkc7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76573?format=json","vulnerability_id":"VCID-2auw-wc6u-ekcs","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20431","reference_id":"","reference_type":"","scores":[{"value":"0.00572","scoring_system":"epss","scoring_elements":"0.6881","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00572","scoring_system":"epss","scoring_elements":"0.68775","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00572","scoring_system":"epss","scoring_elements":"0.68597","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00572","scoring_system":"epss","scoring_elements":"0.68615","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00572","scoring_system":"epss","scoring_elements":"0.68633","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00572","scoring_system":"epss","scoring_elements":"0.6861","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00572","scoring_system":"epss","scoring_elements":"0.68661","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00572","scoring_system":"epss","scoring_elements":"0.68679","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00572","scoring_system":"epss","scoring_elements":"0.68703","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00572","scoring_system":"epss","scoring_elements":"0.68689","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00572","scoring_system":"epss","scoring_elements":"0.6866","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00572","scoring_system":"epss","scoring_elements":"0.68713","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00572","scoring_system":"epss","scoring_elements":"0.68693","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00572","scoring_system":"epss","scoring_elements":"0.68742","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00572","scoring_system":"epss","scoring_elements":"0.68747","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00572","scoring_system":"epss","scoring_elements":"0.68753","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00572","scoring_system":"epss","scoring_elements":"0.68732","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20431"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20430","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20430"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20431","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20431"},{"reference_url":"https://gnunet.org/bugs/view.php?id=5494","reference_id":"","reference_type":"","scores":[],"url":"https://gnunet.org/bugs/view.php?id=5494"},{"reference_url":"https://gnunet.org/git/libextractor.git/commit/?id=489c4a540bb2c4744471441425b8932b97a153e7","reference_id":"","reference_type":"","scores":[],"url":"https://gnunet.org/git/libextractor.git/commit/?id=489c4a540bb2c4744471441425b8932b97a153e7"},{"reference_url":"https://gnunet.org/git/libextractor.git/tree/ChangeLog","reference_id":"","reference_type":"","scores":[],"url":"https://gnunet.org/git/libextractor.git/tree/ChangeLog"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/12/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/12/msg00015.html"},{"reference_url":"https://www.debian.org/security/2018/dsa-4361","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4361"},{"reference_url":"http://www.securityfocus.com/bid/106300","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/106300"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917213","reference_id":"917213","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917213"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20431","reference_id":"CVE-2018-20431","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20431"},{"reference_url":"https://usn.ubuntu.com/4641-1/","reference_id":"USN-4641-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4641-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037232?format=json","purl":"pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1xdm-2dj5-jkc7"},{"vulnerability":"VCID-2auw-wc6u-ekcs"},{"vulnerability":"VCID-3bg1-rwze-kuhw"},{"vulnerability":"VCID-5ymr-xk84-8uh3"},{"vulnerability":"VCID-ahs6-mesc-yqhm"},{"vulnerability":"VCID-bdsg-x852-wfgn"},{"vulnerability":"VCID-kpcg-4av4-gka8"},{"vulnerability":"VCID-kxcz-d7a4-77e8"},{"vulnerability":"VCID-tc8j-82se-qfbk"},{"vulnerability":"VCID-tubv-28uu-2uh8"},{"vulnerability":"VCID-x3k6-yrp9-9ud9"},{"vulnerability":"VCID-xyab-d3gr-zkdw"},{"vulnerability":"VCID-zd6d-q8xx-zud6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.3-4%252Bdeb9u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1051188?format=json","purl":"pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-tubv-28uu-2uh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1"}],"aliases":["CVE-2018-20431"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2auw-wc6u-ekcs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93149?format=json","vulnerability_id":"VCID-3bg1-rwze-kuhw","summary":"In GNU Libextractor 1.4, there is a heap-based buffer overflow in the EXTRACTOR_png_extract_method function in plugins/png_extractor.c, related to processiTXt and stndup.","references":[{"reference_url":"http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00006.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15601","reference_id":"","reference_type":"","scores":[{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62804","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62704","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62587","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62645","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62677","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62642","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62694","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.6271","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62729","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62718","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62695","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62734","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62742","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62724","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62736","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00432","scoring_system":"epss","scoring_elements":"0.62752","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15601"},{"reference_url":"https://ftp.gnu.org/gnu/libextractor/libextractor-1.6.tar.gz","reference_id":"","reference_type":"","scores":[],"url":"https://ftp.gnu.org/gnu/libextractor/libextractor-1.6.tar.gz"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15601","reference_id":"CVE-2017-15601","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15601"},{"reference_url":"https://usn.ubuntu.com/4641-1/","reference_id":"USN-4641-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4641-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1051188?format=json","purl":"pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-tubv-28uu-2uh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1"}],"aliases":["CVE-2017-15601"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3bg1-rwze-kuhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93150?format=json","vulnerability_id":"VCID-5ymr-xk84-8uh3","summary":"In GNU Libextractor 1.4, there is an integer signedness error for the chunk size in the EXTRACTOR_nsfe_extract_method function in plugins/nsfe_extractor.c, leading to an infinite loop for a crafted size.","references":[{"reference_url":"http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00005.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15602","reference_id":"","reference_type":"","scores":[{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61276","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61218","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61073","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61151","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61179","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61144","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61192","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61207","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61227","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61214","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61195","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61235","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61241","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61222","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61211","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.6122","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00408","scoring_system":"epss","scoring_elements":"0.61169","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15602"},{"reference_url":"https://ftp.gnu.org/gnu/libextractor/libextractor-1.6.tar.gz","reference_id":"","reference_type":"","scores":[],"url":"https://ftp.gnu.org/gnu/libextractor/libextractor-1.6.tar.gz"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15602","reference_id":"CVE-2017-15602","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15602"},{"reference_url":"https://usn.ubuntu.com/4641-1/","reference_id":"USN-4641-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4641-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1051188?format=json","purl":"pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-tubv-28uu-2uh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1"}],"aliases":["CVE-2017-15602"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5ymr-xk84-8uh3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/76572?format=json","vulnerability_id":"VCID-ahs6-mesc-yqhm","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20430","reference_id":"","reference_type":"","scores":[{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68753","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68715","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68539","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68557","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68575","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68553","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68604","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68622","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68647","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68634","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68605","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68644","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68655","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68635","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68683","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68688","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68693","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68673","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-20430"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20430","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20430"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20431","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20431"},{"reference_url":"https://gnunet.org/bugs/view.php?id=5493","reference_id":"","reference_type":"","scores":[],"url":"https://gnunet.org/bugs/view.php?id=5493"},{"reference_url":"https://gnunet.org/git/libextractor.git/commit/?id=b405d707b36e0654900cba78e89f49779efea110","reference_id":"","reference_type":"","scores":[],"url":"https://gnunet.org/git/libextractor.git/commit/?id=b405d707b36e0654900cba78e89f49779efea110"},{"reference_url":"https://gnunet.org/git/libextractor.git/tree/ChangeLog","reference_id":"","reference_type":"","scores":[],"url":"https://gnunet.org/git/libextractor.git/tree/ChangeLog"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/12/msg00015.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/12/msg00015.html"},{"reference_url":"https://www.debian.org/security/2018/dsa-4361","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4361"},{"reference_url":"http://www.securityfocus.com/bid/106300","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/106300"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917214","reference_id":"917214","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=917214"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20430","reference_id":"CVE-2018-20430","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-20430"},{"reference_url":"https://usn.ubuntu.com/4641-1/","reference_id":"USN-4641-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4641-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037232?format=json","purl":"pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1xdm-2dj5-jkc7"},{"vulnerability":"VCID-2auw-wc6u-ekcs"},{"vulnerability":"VCID-3bg1-rwze-kuhw"},{"vulnerability":"VCID-5ymr-xk84-8uh3"},{"vulnerability":"VCID-ahs6-mesc-yqhm"},{"vulnerability":"VCID-bdsg-x852-wfgn"},{"vulnerability":"VCID-kpcg-4av4-gka8"},{"vulnerability":"VCID-kxcz-d7a4-77e8"},{"vulnerability":"VCID-tc8j-82se-qfbk"},{"vulnerability":"VCID-tubv-28uu-2uh8"},{"vulnerability":"VCID-x3k6-yrp9-9ud9"},{"vulnerability":"VCID-xyab-d3gr-zkdw"},{"vulnerability":"VCID-zd6d-q8xx-zud6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.3-4%252Bdeb9u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1051188?format=json","purl":"pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-tubv-28uu-2uh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1"}],"aliases":["CVE-2018-20430"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ahs6-mesc-yqhm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93168?format=json","vulnerability_id":"VCID-bdsg-x852-wfgn","summary":"GNU Libextractor 1.6 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted GIF, IT (Impulse Tracker), NSFE, S3M (Scream Tracker 3), SID, or XM (eXtended Module) file, as demonstrated by the EXTRACTOR_xm_extract_method function in plugins/xm_extractor.c.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-17440","reference_id":"","reference_type":"","scores":[{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67358","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67249","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67296","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67275","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67295","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67306","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67307","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.6728","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67321","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67298","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00531","scoring_system":"epss","scoring_elements":"0.67284","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.76956","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.76991","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.76973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.77005","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01003","scoring_system":"epss","scoring_elements":"0.76962","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-17440"},{"reference_url":"https://bugs.debian.org/883528#35","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.debian.org/883528#35"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17440","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17440"},{"reference_url":"https://gnunet.org/git/libextractor.git/commit/?id=7cc63b001ceaf81143795321379c835486d0c92e","reference_id":"","reference_type":"","scores":[],"url":"https://gnunet.org/git/libextractor.git/commit/?id=7cc63b001ceaf81143795321379c835486d0c92e"},{"reference_url":"https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00000.html"},{"reference_url":"https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00001.html"},{"reference_url":"https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00002.html"},{"reference_url":"https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00004.html"},{"reference_url":"https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.gnu.org/archive/html/bug-libextractor/2017-11/msg00005.html"},{"reference_url":"http://www.securityfocus.com/bid/102116","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/102116"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883528","reference_id":"883528","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883528"},{"reference_url":"https://security.archlinux.org/ASA-201807-16","reference_id":"ASA-201807-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201807-16"},{"reference_url":"https://security.archlinux.org/AVG-541","reference_id":"AVG-541","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-541"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:libextractor:1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-17440","reference_id":"CVE-2017-17440","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-17440"},{"reference_url":"https://usn.ubuntu.com/4641-1/","reference_id":"USN-4641-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4641-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1051188?format=json","purl":"pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-tubv-28uu-2uh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1"}],"aliases":["CVE-2017-17440"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bdsg-x852-wfgn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73737?format=json","vulnerability_id":"VCID-kpcg-4av4-gka8","summary":"security update","references":[{"reference_url":"http://lists.gnu.org/archive/html/bug-libextractor/2018-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.gnu.org/archive/html/bug-libextractor/2018-07/msg00001.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14346","reference_id":"","reference_type":"","scores":[{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65936","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65892","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.6573","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.6578","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65809","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65774","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65827","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65838","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65857","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65844","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65814","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65847","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65862","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65849","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65861","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65871","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65872","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65845","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-14346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14347","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16430","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16430"},{"reference_url":"https://gnunet.org/git/libextractor.git/commit/?id=ad19e7fe0adc99d5710eff1ed48d91a7b75a950e","reference_id":"","reference_type":"","scores":[],"url":"https://gnunet.org/git/libextractor.git/commit/?id=ad19e7fe0adc99d5710eff1ed48d91a7b75a950e"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/08/msg00025.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/08/msg00025.html"},{"reference_url":"https://www.debian.org/security/2018/dsa-4290","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4290"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904903","reference_id":"904903","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=904903"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-14346","reference_id":"CVE-2018-14346","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-14346"},{"reference_url":"https://usn.ubuntu.com/4641-1/","reference_id":"USN-4641-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4641-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037232?format=json","purl":"pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1xdm-2dj5-jkc7"},{"vulnerability":"VCID-2auw-wc6u-ekcs"},{"vulnerability":"VCID-3bg1-rwze-kuhw"},{"vulnerability":"VCID-5ymr-xk84-8uh3"},{"vulnerability":"VCID-ahs6-mesc-yqhm"},{"vulnerability":"VCID-bdsg-x852-wfgn"},{"vulnerability":"VCID-kpcg-4av4-gka8"},{"vulnerability":"VCID-kxcz-d7a4-77e8"},{"vulnerability":"VCID-tc8j-82se-qfbk"},{"vulnerability":"VCID-tubv-28uu-2uh8"},{"vulnerability":"VCID-x3k6-yrp9-9ud9"},{"vulnerability":"VCID-xyab-d3gr-zkdw"},{"vulnerability":"VCID-zd6d-q8xx-zud6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.3-4%252Bdeb9u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1051188?format=json","purl":"pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-tubv-28uu-2uh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1"}],"aliases":["CVE-2018-14346"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kpcg-4av4-gka8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73739?format=json","vulnerability_id":"VCID-kxcz-d7a4-77e8","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16430","reference_id":"","reference_type":"","scores":[{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80098","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80105","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80125","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80113","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80141","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80148","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80167","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80151","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80143","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80173","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80174","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80176","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80206","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80215","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.8023","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80245","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80268","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01358","scoring_system":"epss","scoring_elements":"0.80284","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16430"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14346","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14346"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14347","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14347"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16430","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16430"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907987","reference_id":"907987","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907987"},{"reference_url":"https://usn.ubuntu.com/4641-1/","reference_id":"USN-4641-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4641-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1037232?format=json","purl":"pkg:deb/debian/libextractor@1:1.3-4%2Bdeb9u3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1xdm-2dj5-jkc7"},{"vulnerability":"VCID-2auw-wc6u-ekcs"},{"vulnerability":"VCID-3bg1-rwze-kuhw"},{"vulnerability":"VCID-5ymr-xk84-8uh3"},{"vulnerability":"VCID-ahs6-mesc-yqhm"},{"vulnerability":"VCID-bdsg-x852-wfgn"},{"vulnerability":"VCID-kpcg-4av4-gka8"},{"vulnerability":"VCID-kxcz-d7a4-77e8"},{"vulnerability":"VCID-tc8j-82se-qfbk"},{"vulnerability":"VCID-tubv-28uu-2uh8"},{"vulnerability":"VCID-x3k6-yrp9-9ud9"},{"vulnerability":"VCID-xyab-d3gr-zkdw"},{"vulnerability":"VCID-zd6d-q8xx-zud6"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.3-4%252Bdeb9u3"},{"url":"http://public2.vulnerablecode.io/api/packages/1051188?format=json","purl":"pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-tubv-28uu-2uh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1"}],"aliases":["CVE-2018-16430"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kxcz-d7a4-77e8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93154?format=json","vulnerability_id":"VCID-tc8j-82se-qfbk","summary":"In GNU Libextractor 1.4, there is an out-of-bounds read in the EXTRACTOR_dvi_extract_method function in plugins/dvi_extractor.c.","references":[{"reference_url":"http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00008.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00008.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15922","reference_id":"","reference_type":"","scores":[{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.38822","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.38732","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.38805","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39077","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39262","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39286","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39204","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39259","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39275","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39287","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39249","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39231","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39284","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39255","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.39167","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.38956","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.38937","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.38855","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15922"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15922","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15922"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html"},{"reference_url":"http://www.securityfocus.com/bid/101595","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101595"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=880016","reference_id":"880016","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=880016"},{"reference_url":"https://security.archlinux.org/ASA-201711-16","reference_id":"ASA-201711-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-16"},{"reference_url":"https://security.archlinux.org/AVG-471","reference_id":"AVG-471","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-471"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15922","reference_id":"CVE-2017-15922","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15922"},{"reference_url":"https://usn.ubuntu.com/4641-1/","reference_id":"USN-4641-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4641-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1051188?format=json","purl":"pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-tubv-28uu-2uh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1"}],"aliases":["CVE-2017-15922"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tc8j-82se-qfbk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93146?format=json","vulnerability_id":"VCID-x3k6-yrp9-9ud9","summary":"In GNU Libextractor 1.4, there is a NULL Pointer Dereference in flac_metadata in flac_extractor.c.","references":[{"reference_url":"http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00003.html"},{"reference_url":"http://openwall.com/lists/oss-security/2017/10/11/1","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2017/10/11/1"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15267","reference_id":"","reference_type":"","scores":[{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71253","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71219","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71047","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71056","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71074","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71048","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71091","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71103","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71126","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71112","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71095","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71141","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71149","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71185","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71193","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71197","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0066","scoring_system":"epss","scoring_elements":"0.71181","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15267"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1499600","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1499600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15267","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15267"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html"},{"reference_url":"http://www.securityfocus.com/bid/101272","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101272"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878314","reference_id":"878314","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878314"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15267","reference_id":"CVE-2017-15267","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15267"},{"reference_url":"https://usn.ubuntu.com/4641-1/","reference_id":"USN-4641-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4641-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1051188?format=json","purl":"pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-tubv-28uu-2uh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1"}],"aliases":["CVE-2017-15267"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x3k6-yrp9-9ud9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93145?format=json","vulnerability_id":"VCID-xyab-d3gr-zkdw","summary":"In GNU Libextractor 1.4, there is a Divide-By-Zero in EXTRACTOR_wav_extract_method in wav_extractor.c via a zero sample rate.","references":[{"reference_url":"http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00002.html"},{"reference_url":"http://openwall.com/lists/oss-security/2017/10/11/1","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2017/10/11/1"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15266","reference_id":"","reference_type":"","scores":[{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58404","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58362","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58308","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58393","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58413","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58387","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.5844","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58446","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58463","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58443","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58424","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58456","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58461","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58438","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58399","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58411","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58397","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15266"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1499599","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1499599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15266","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15266"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html"},{"reference_url":"http://www.securityfocus.com/bid/101271","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101271"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878314","reference_id":"878314","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878314"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15266","reference_id":"CVE-2017-15266","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15266"},{"reference_url":"https://usn.ubuntu.com/4641-1/","reference_id":"USN-4641-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4641-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1051188?format=json","purl":"pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-tubv-28uu-2uh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1"}],"aliases":["CVE-2017-15266"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xyab-d3gr-zkdw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/93148?format=json","vulnerability_id":"VCID-zd6d-q8xx-zud6","summary":"In GNU Libextractor 1.4, there is a NULL Pointer Dereference in the EXTRACTOR_nsf_extract_method function of plugins/nsf_extractor.c.","references":[{"reference_url":"http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.gnu.org/archive/html/bug-libextractor/2017-10/msg00004.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15600","reference_id":"","reference_type":"","scores":[{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.82194","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.82171","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.81993","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.82005","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.82027","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.82022","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.82049","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.82056","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.82076","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.82066","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.82058","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.82093","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.82095","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.82117","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.82129","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.82132","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01659","scoring_system":"epss","scoring_elements":"0.82149","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15600"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1501695","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1501695"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15600"},{"reference_url":"https://ftp.gnu.org/gnu/libextractor/libextractor-1.6.tar.gz","reference_id":"","reference_type":"","scores":[],"url":"https://ftp.gnu.org/gnu/libextractor/libextractor-1.6.tar.gz"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00000.html"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libextractor:1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15600","reference_id":"CVE-2017-15600","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15600"},{"reference_url":"https://usn.ubuntu.com/4641-1/","reference_id":"USN-4641-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4641-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1051188?format=json","purl":"pkg:deb/debian/libextractor@1:1.8-2%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-tubv-28uu-2uh8"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1"}],"aliases":["CVE-2017-15600"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zd6d-q8xx-zud6"}],"risk_score":"3.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libextractor@1:1.8-2%252Bdeb10u1"}