Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/poco@1.10.0-6%2Bdeb11u1
Typedeb
Namespacedebian
Namepoco
Version1.10.0-6+deb11u1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.14.2-6
Latest_non_vulnerable_version1.14.2-6
Affected_by_vulnerabilities
0
url VCID-2yhr-1v3n-p7a4
vulnerability_id VCID-2yhr-1v3n-p7a4
summary
Integer Overflow or Wraparound
UTF32Encoding.cpp in POCO has a Poco::UTF32Encoding integer overflow and resultant stack buffer overflow because Poco::UTF32Encoding::convert() and Poco::UTF32::queryConvert() may return a negative integer if a UTF-32 byte sequence evaluates to a value of 0x80000000 or higher. This is fixed in 1.11.8p2, 1.12.5p2, and 1.13.0.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-52389
reference_id
reference_type
scores
0
value 0.00132
scoring_system epss
scoring_elements 0.32168
published_at 2026-05-12T12:55:00Z
1
value 0.00132
scoring_system epss
scoring_elements 0.32303
published_at 2026-04-29T12:55:00Z
2
value 0.00132
scoring_system epss
scoring_elements 0.32165
published_at 2026-05-05T12:55:00Z
3
value 0.00132
scoring_system epss
scoring_elements 0.32228
published_at 2026-05-07T12:55:00Z
4
value 0.00132
scoring_system epss
scoring_elements 0.32238
published_at 2026-05-09T12:55:00Z
5
value 0.00132
scoring_system epss
scoring_elements 0.32147
published_at 2026-05-11T12:55:00Z
6
value 0.00132
scoring_system epss
scoring_elements 0.32801
published_at 2026-04-02T12:55:00Z
7
value 0.00132
scoring_system epss
scoring_elements 0.32837
published_at 2026-04-04T12:55:00Z
8
value 0.00132
scoring_system epss
scoring_elements 0.32659
published_at 2026-04-07T12:55:00Z
9
value 0.00132
scoring_system epss
scoring_elements 0.32707
published_at 2026-04-08T12:55:00Z
10
value 0.00132
scoring_system epss
scoring_elements 0.32733
published_at 2026-04-09T12:55:00Z
11
value 0.00132
scoring_system epss
scoring_elements 0.32734
published_at 2026-04-11T12:55:00Z
12
value 0.00132
scoring_system epss
scoring_elements 0.32697
published_at 2026-04-12T12:55:00Z
13
value 0.00132
scoring_system epss
scoring_elements 0.3267
published_at 2026-04-13T12:55:00Z
14
value 0.00132
scoring_system epss
scoring_elements 0.32709
published_at 2026-04-16T12:55:00Z
15
value 0.00132
scoring_system epss
scoring_elements 0.32686
published_at 2026-04-18T12:55:00Z
16
value 0.00132
scoring_system epss
scoring_elements 0.32656
published_at 2026-04-21T12:55:00Z
17
value 0.00132
scoring_system epss
scoring_elements 0.32502
published_at 2026-04-24T12:55:00Z
18
value 0.00132
scoring_system epss
scoring_elements 0.32386
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-52389
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52389
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52389
2
reference_url https://github.com/pocoproject/poco/compare/poco-1.12.5p2-release...poco-1.13.0-release
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-09T23:34:09Z/
url https://github.com/pocoproject/poco/compare/poco-1.12.5p2-release...poco-1.13.0-release
3
reference_url https://github.com/pocoproject/poco/issues/4320
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-09T23:34:09Z/
url https://github.com/pocoproject/poco/issues/4320
4
reference_url https://pocoproject.org/blog/?p=1226
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-09T23:34:09Z/
url https://pocoproject.org/blog/?p=1226
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-52389
reference_id CVE-2023-52389
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-52389
fixed_packages
0
url pkg:deb/debian/poco@1.11.0-3%2Bdeb12u1
purl pkg:deb/debian/poco@1.11.0-3%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-546e-svdf-fyac
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.11.0-3%252Bdeb12u1
aliases CVE-2023-52389
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2yhr-1v3n-p7a4
1
url VCID-546e-svdf-fyac
vulnerability_id VCID-546e-svdf-fyac
summary A vulnerability was found in poco up to 1.14.1. It has been rated as problematic. Affected by this issue is the function MultipartInputStream of the file Net/src/MultipartReader.cpp. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.14.2 is able to address this issue. The patch is identified as 6f2f85913c191ab9ddfb8fae781f5d66afccf3bf. It is recommended to upgrade the affected component.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-6375
reference_id
reference_type
scores
0
value 0.0006
scoring_system epss
scoring_elements 0.18896
published_at 2026-04-08T12:55:00Z
1
value 0.0006
scoring_system epss
scoring_elements 0.19009
published_at 2026-04-02T12:55:00Z
2
value 0.0006
scoring_system epss
scoring_elements 0.1881
published_at 2026-04-16T12:55:00Z
3
value 0.0006
scoring_system epss
scoring_elements 0.18859
published_at 2026-04-13T12:55:00Z
4
value 0.0006
scoring_system epss
scoring_elements 0.1891
published_at 2026-04-12T12:55:00Z
5
value 0.0006
scoring_system epss
scoring_elements 0.18957
published_at 2026-04-11T12:55:00Z
6
value 0.0006
scoring_system epss
scoring_elements 0.1895
published_at 2026-04-09T12:55:00Z
7
value 0.0006
scoring_system epss
scoring_elements 0.18816
published_at 2026-04-07T12:55:00Z
8
value 0.0006
scoring_system epss
scoring_elements 0.19061
published_at 2026-04-04T12:55:00Z
9
value 0.00162
scoring_system epss
scoring_elements 0.37169
published_at 2026-04-18T12:55:00Z
10
value 0.00162
scoring_system epss
scoring_elements 0.37113
published_at 2026-04-21T12:55:00Z
11
value 0.00162
scoring_system epss
scoring_elements 0.36688
published_at 2026-05-12T12:55:00Z
12
value 0.00162
scoring_system epss
scoring_elements 0.36665
published_at 2026-05-11T12:55:00Z
13
value 0.00162
scoring_system epss
scoring_elements 0.36742
published_at 2026-05-09T12:55:00Z
14
value 0.00162
scoring_system epss
scoring_elements 0.36718
published_at 2026-05-07T12:55:00Z
15
value 0.00162
scoring_system epss
scoring_elements 0.3665
published_at 2026-05-05T12:55:00Z
16
value 0.00162
scoring_system epss
scoring_elements 0.36769
published_at 2026-04-29T12:55:00Z
17
value 0.00162
scoring_system epss
scoring_elements 0.36856
published_at 2026-04-26T12:55:00Z
18
value 0.00162
scoring_system epss
scoring_elements 0.36888
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-6375
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6375
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6375
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108157
reference_id 1108157
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108157
4
reference_url https://github.com/pocoproject/poco/issues/4915
reference_id 4915
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-23T14:44:07Z/
url https://github.com/pocoproject/poco/issues/4915
5
reference_url https://github.com/pocoproject/poco/commit/6f2f85913c191ab9ddfb8fae781f5d66afccf3bf
reference_id 6f2f85913c191ab9ddfb8fae781f5d66afccf3bf
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-23T14:44:07Z/
url https://github.com/pocoproject/poco/commit/6f2f85913c191ab9ddfb8fae781f5d66afccf3bf
6
reference_url https://vuldb.com/?ctiid.313370
reference_id ?ctiid.313370
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-23T14:44:07Z/
url https://vuldb.com/?ctiid.313370
7
reference_url https://vuldb.com/?id.313370
reference_id ?id.313370
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-23T14:44:07Z/
url https://vuldb.com/?id.313370
8
reference_url https://github.com/pocoproject/poco/releases/tag/poco-1.14.2-release
reference_id poco-1.14.2-release
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-23T14:44:07Z/
url https://github.com/pocoproject/poco/releases/tag/poco-1.14.2-release
9
reference_url https://github.com/user-attachments/files/19524599/poco_crash.txt
reference_id poco_crash.txt
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-23T14:44:07Z/
url https://github.com/user-attachments/files/19524599/poco_crash.txt
10
reference_url https://vuldb.com/?submit.597446
reference_id ?submit.597446
reference_type
scores
0
value 1.7
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C
1
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
2
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
3
value 4.8
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
4
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-23T14:44:07Z/
url https://vuldb.com/?submit.597446
fixed_packages
0
url pkg:deb/debian/poco@1.14.2-3
purl pkg:deb/debian/poco@1.14.2-3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.14.2-3
1
url pkg:deb/debian/poco@1.14.2-4
purl pkg:deb/debian/poco@1.14.2-4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.14.2-4
2
url pkg:deb/debian/poco@1.14.2-6
purl pkg:deb/debian/poco@1.14.2-6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.14.2-6
aliases CVE-2025-6375
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-546e-svdf-fyac
Fixing_vulnerabilities
Risk_score4.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/poco@1.10.0-6%252Bdeb11u1