Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libtirpc@0.2.5-1%2Bdeb8u1
Typedeb
Namespacedebian
Namelibtirpc
Version0.2.5-1+deb8u1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.3.1-1+deb11u1
Latest_non_vulnerable_version1.3.1-1+deb11u1
Affected_by_vulnerabilities
0
url VCID-17g3-3gth-nqh8
vulnerability_id VCID-17g3-3gth-nqh8
summary libtirpc: Segmentation fault in makefd_xprt return value in svc_vc.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14622.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14622.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14622
reference_id
reference_type
scores
0
value 0.02344
scoring_system epss
scoring_elements 0.84801
published_at 2026-04-01T12:55:00Z
1
value 0.02344
scoring_system epss
scoring_elements 0.84816
published_at 2026-04-02T12:55:00Z
2
value 0.02344
scoring_system epss
scoring_elements 0.84834
published_at 2026-04-04T12:55:00Z
3
value 0.02344
scoring_system epss
scoring_elements 0.84836
published_at 2026-04-07T12:55:00Z
4
value 0.02344
scoring_system epss
scoring_elements 0.84858
published_at 2026-04-08T12:55:00Z
5
value 0.02344
scoring_system epss
scoring_elements 0.84865
published_at 2026-04-09T12:55:00Z
6
value 0.02344
scoring_system epss
scoring_elements 0.84883
published_at 2026-04-11T12:55:00Z
7
value 0.02344
scoring_system epss
scoring_elements 0.84882
published_at 2026-04-12T12:55:00Z
8
value 0.02344
scoring_system epss
scoring_elements 0.84876
published_at 2026-04-13T12:55:00Z
9
value 0.02344
scoring_system epss
scoring_elements 0.84898
published_at 2026-04-18T12:55:00Z
10
value 0.02344
scoring_system epss
scoring_elements 0.84896
published_at 2026-04-21T12:55:00Z
11
value 0.02344
scoring_system epss
scoring_elements 0.84922
published_at 2026-04-24T12:55:00Z
12
value 0.02344
scoring_system epss
scoring_elements 0.84931
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14622
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14622
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1620293
reference_id 1620293
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1620293
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907608
reference_id 907608
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=907608
6
reference_url https://usn.ubuntu.com/3759-1/
reference_id USN-3759-1
reference_type
scores
url https://usn.ubuntu.com/3759-1/
7
reference_url https://usn.ubuntu.com/3759-2/
reference_id USN-3759-2
reference_type
scores
url https://usn.ubuntu.com/3759-2/
fixed_packages
0
url pkg:deb/debian/libtirpc@1.1.4-0.4
purl pkg:deb/debian/libtirpc@1.1.4-0.4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7rgj-sndb-jugs
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtirpc@1.1.4-0.4
aliases CVE-2018-14622
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-17g3-3gth-nqh8
1
url VCID-7rgj-sndb-jugs
vulnerability_id VCID-7rgj-sndb-jugs
summary A vulnerability has been discovered in Libtirpc which could result in denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46828.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46828.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-46828
reference_id
reference_type
scores
0
value 0.01199
scoring_system epss
scoring_elements 0.78979
published_at 2026-04-29T12:55:00Z
1
value 0.01199
scoring_system epss
scoring_elements 0.78855
published_at 2026-04-01T12:55:00Z
2
value 0.01199
scoring_system epss
scoring_elements 0.78861
published_at 2026-04-02T12:55:00Z
3
value 0.01199
scoring_system epss
scoring_elements 0.78897
published_at 2026-04-08T12:55:00Z
4
value 0.01199
scoring_system epss
scoring_elements 0.78903
published_at 2026-04-09T12:55:00Z
5
value 0.01199
scoring_system epss
scoring_elements 0.78927
published_at 2026-04-18T12:55:00Z
6
value 0.01199
scoring_system epss
scoring_elements 0.78911
published_at 2026-04-12T12:55:00Z
7
value 0.01199
scoring_system epss
scoring_elements 0.78901
published_at 2026-04-13T12:55:00Z
8
value 0.01199
scoring_system epss
scoring_elements 0.7893
published_at 2026-04-16T12:55:00Z
9
value 0.01199
scoring_system epss
scoring_elements 0.78925
published_at 2026-04-21T12:55:00Z
10
value 0.01199
scoring_system epss
scoring_elements 0.78956
published_at 2026-04-24T12:55:00Z
11
value 0.01199
scoring_system epss
scoring_elements 0.78963
published_at 2026-04-26T12:55:00Z
12
value 0.01199
scoring_system epss
scoring_elements 0.7889
published_at 2026-04-04T12:55:00Z
13
value 0.01199
scoring_system epss
scoring_elements 0.78872
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-46828
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46828
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46828
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015873
reference_id 1015873
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015873
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2109352
reference_id 2109352
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2109352
6
reference_url https://www.debian.org/security/2022/dsa-5200
reference_id dsa-5200
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:08Z/
url https://www.debian.org/security/2022/dsa-5200
7
reference_url https://security.gentoo.org/glsa/202210-33
reference_id GLSA-202210-33
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:08Z/
url https://security.gentoo.org/glsa/202210-33
8
reference_url http://git.linux-nfs.org/?p=steved/libtirpc.git%3Ba=commit%3Bh=86529758570cef4c73fb9b9c4104fdc510f701ed
reference_id libtirpc.git%3Ba=commit%3Bh=86529758570cef4c73fb9b9c4104fdc510f701ed
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:08Z/
url http://git.linux-nfs.org/?p=steved/libtirpc.git%3Ba=commit%3Bh=86529758570cef4c73fb9b9c4104fdc510f701ed
9
reference_url https://lists.debian.org/debian-lts-announce/2022/08/msg00004.html
reference_id msg00004.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:08Z/
url https://lists.debian.org/debian-lts-announce/2022/08/msg00004.html
10
reference_url https://security.netapp.com/advisory/ntap-20221007-0004/
reference_id ntap-20221007-0004
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:27:08Z/
url https://security.netapp.com/advisory/ntap-20221007-0004/
11
reference_url https://access.redhat.com/errata/RHSA-2022:8400
reference_id RHSA-2022:8400
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8400
12
reference_url https://usn.ubuntu.com/5538-1/
reference_id USN-5538-1
reference_type
scores
url https://usn.ubuntu.com/5538-1/
fixed_packages
0
url pkg:deb/debian/libtirpc@1.3.1-1%2Bdeb11u1
purl pkg:deb/debian/libtirpc@1.3.1-1%2Bdeb11u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtirpc@1.3.1-1%252Bdeb11u1
aliases CVE-2021-46828
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7rgj-sndb-jugs
2
url VCID-84zb-rzwk-fbfp
vulnerability_id VCID-84zb-rzwk-fbfp
summary glibc: libtirpc: stack (frame) overflow in Sun RPC clntudp_call()
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4429.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4429.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4429
reference_id
reference_type
scores
0
value 0.01997
scoring_system epss
scoring_elements 0.8358
published_at 2026-04-01T12:55:00Z
1
value 0.01997
scoring_system epss
scoring_elements 0.83719
published_at 2026-04-29T12:55:00Z
2
value 0.01997
scoring_system epss
scoring_elements 0.83682
published_at 2026-04-21T12:55:00Z
3
value 0.01997
scoring_system epss
scoring_elements 0.83706
published_at 2026-04-24T12:55:00Z
4
value 0.01997
scoring_system epss
scoring_elements 0.83713
published_at 2026-04-26T12:55:00Z
5
value 0.01997
scoring_system epss
scoring_elements 0.83593
published_at 2026-04-02T12:55:00Z
6
value 0.01997
scoring_system epss
scoring_elements 0.83607
published_at 2026-04-04T12:55:00Z
7
value 0.01997
scoring_system epss
scoring_elements 0.83609
published_at 2026-04-07T12:55:00Z
8
value 0.01997
scoring_system epss
scoring_elements 0.83633
published_at 2026-04-08T12:55:00Z
9
value 0.01997
scoring_system epss
scoring_elements 0.83641
published_at 2026-04-09T12:55:00Z
10
value 0.01997
scoring_system epss
scoring_elements 0.83658
published_at 2026-04-11T12:55:00Z
11
value 0.01997
scoring_system epss
scoring_elements 0.83651
published_at 2026-04-12T12:55:00Z
12
value 0.01997
scoring_system epss
scoring_elements 0.83646
published_at 2026-04-13T12:55:00Z
13
value 0.01997
scoring_system epss
scoring_elements 0.83681
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4429
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html
7
reference_url https://source.android.com/security/bulletin/2017-12-01
reference_id
reference_type
scores
url https://source.android.com/security/bulletin/2017-12-01
8
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=20112
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=20112
9
reference_url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bc779a1a5b3035133024b21e2f339fe4219fb11c
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bc779a1a5b3035133024b21e2f339fe4219fb11c
10
reference_url https://www.oracle.com//security-alerts/cpujul2021.html
reference_id
reference_type
scores
url https://www.oracle.com//security-alerts/cpujul2021.html
11
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21995039
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21995039
12
reference_url http://www.securityfocus.com/bid/102073
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/102073
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1337136
reference_id 1337136
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1337136
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840347
reference_id 840347
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840347
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4429
reference_id CVE-2016-4429
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-4429
23
reference_url https://usn.ubuntu.com/3239-1/
reference_id USN-3239-1
reference_type
scores
url https://usn.ubuntu.com/3239-1/
24
reference_url https://usn.ubuntu.com/3759-1/
reference_id USN-3759-1
reference_type
scores
url https://usn.ubuntu.com/3759-1/
25
reference_url https://usn.ubuntu.com/3759-2/
reference_id USN-3759-2
reference_type
scores
url https://usn.ubuntu.com/3759-2/
fixed_packages
0
url pkg:deb/debian/libtirpc@0.2.5-1.2%2Bdeb9u1
purl pkg:deb/debian/libtirpc@0.2.5-1.2%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17g3-3gth-nqh8
1
vulnerability VCID-7rgj-sndb-jugs
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtirpc@0.2.5-1.2%252Bdeb9u1
aliases CVE-2016-4429
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-84zb-rzwk-fbfp
3
url VCID-ubmz-6h4h-b7ae
vulnerability_id VCID-ubmz-6h4h-b7ae
summary
A vulnerability has been found in Libtirpc and RPCBind which may
    allow a remote attacker to cause a Denial of Service condition.
references
0
reference_url http://openwall.com/lists/oss-security/2017/05/03/12
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2017/05/03/12
1
reference_url http://openwall.com/lists/oss-security/2017/05/04/1
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2017/05/04/1
2
reference_url https://access.redhat.com/errata/RHBA-2017:1497
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHBA-2017:1497
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8779.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8779.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8779
reference_id
reference_type
scores
0
value 0.81381
scoring_system epss
scoring_elements 0.99164
published_at 2026-04-01T12:55:00Z
1
value 0.81381
scoring_system epss
scoring_elements 0.99178
published_at 2026-04-29T12:55:00Z
2
value 0.81381
scoring_system epss
scoring_elements 0.9917
published_at 2026-04-07T12:55:00Z
3
value 0.81381
scoring_system epss
scoring_elements 0.99172
published_at 2026-04-12T12:55:00Z
4
value 0.81381
scoring_system epss
scoring_elements 0.99171
published_at 2026-04-13T12:55:00Z
5
value 0.81381
scoring_system epss
scoring_elements 0.99173
published_at 2026-04-16T12:55:00Z
6
value 0.81381
scoring_system epss
scoring_elements 0.99174
published_at 2026-04-18T12:55:00Z
7
value 0.81381
scoring_system epss
scoring_elements 0.99176
published_at 2026-04-21T12:55:00Z
8
value 0.81381
scoring_system epss
scoring_elements 0.99177
published_at 2026-04-26T12:55:00Z
9
value 0.81381
scoring_system epss
scoring_elements 0.99165
published_at 2026-04-02T12:55:00Z
10
value 0.81381
scoring_system epss
scoring_elements 0.99168
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8779
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8779
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/drbothen/GO-RPCBOMB
reference_id
reference_type
scores
url https://github.com/drbothen/GO-RPCBOMB
8
reference_url https://github.com/guidovranken/rpcbomb/
reference_id
reference_type
scores
url https://github.com/guidovranken/rpcbomb/
9
reference_url https://guidovranken.wordpress.com/2017/05/03/rpcbomb-remote-rpcbind-denial-of-service-patches/
reference_id
reference_type
scores
url https://guidovranken.wordpress.com/2017/05/03/rpcbomb-remote-rpcbind-denial-of-service-patches/
10
reference_url https://security.netapp.com/advisory/ntap-20180109-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20180109-0001/
11
reference_url https://www.exploit-db.com/exploits/41974/
reference_id
reference_type
scores
url https://www.exploit-db.com/exploits/41974/
12
reference_url http://www.debian.org/security/2017/dsa-3845
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3845
13
reference_url http://www.securityfocus.com/bid/98325
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/98325
14
reference_url http://www.securitytracker.com/id/1038532
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1038532
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1448124
reference_id 1448124
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1448124
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861834
reference_id 861834
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861834
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861835
reference_id 861835
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861835
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861836
reference_id 861836
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=861836
19
reference_url https://security.archlinux.org/ASA-201705-4
reference_id ASA-201705-4
reference_type
scores
url https://security.archlinux.org/ASA-201705-4
20
reference_url https://security.archlinux.org/ASA-201705-5
reference_id ASA-201705-5
reference_type
scores
url https://security.archlinux.org/ASA-201705-5
21
reference_url https://security.archlinux.org/ASA-201705-6
reference_id ASA-201705-6
reference_type
scores
url https://security.archlinux.org/ASA-201705-6
22
reference_url https://security.archlinux.org/AVG-261
reference_id AVG-261
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-261
23
reference_url https://security.archlinux.org/AVG-262
reference_id AVG-262
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-262
24
reference_url https://security.archlinux.org/AVG-263
reference_id AVG-263
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-263
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtirpc_project:libtirpc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libtirpc_project:libtirpc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libtirpc_project:libtirpc:*:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ntirpc_project:ntirpc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ntirpc_project:ntirpc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ntirpc_project:ntirpc:*:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rpcbind_project:rpcbind:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:rpcbind_project:rpcbind:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:rpcbind_project:rpcbind:*:*:*:*:*:*:*:*
28
reference_url https://github.com/guidovranken/rpcbomb/blob/fe53048af2d4fb78c911e71a30f21afcffbbf5e1/rpcbomb.rb
reference_id CVE-2017-8779
reference_type exploit
scores
url https://github.com/guidovranken/rpcbomb/blob/fe53048af2d4fb78c911e71a30f21afcffbbf5e1/rpcbomb.rb
29
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/41974.rb
reference_id CVE-2017-8779
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/41974.rb
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-8779
reference_id CVE-2017-8779
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-8779
31
reference_url https://security.gentoo.org/glsa/201706-07
reference_id GLSA-201706-07
reference_type
scores
url https://security.gentoo.org/glsa/201706-07
32
reference_url https://access.redhat.com/errata/RHSA-2017:1262
reference_id RHSA-2017:1262
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1262
33
reference_url https://access.redhat.com/errata/RHSA-2017:1263
reference_id RHSA-2017:1263
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1263
34
reference_url https://access.redhat.com/errata/RHSA-2017:1267
reference_id RHSA-2017:1267
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1267
35
reference_url https://access.redhat.com/errata/RHSA-2017:1268
reference_id RHSA-2017:1268
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1268
36
reference_url https://access.redhat.com/errata/RHSA-2017:1395
reference_id RHSA-2017:1395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1395
37
reference_url https://usn.ubuntu.com/3759-1/
reference_id USN-3759-1
reference_type
scores
url https://usn.ubuntu.com/3759-1/
38
reference_url https://usn.ubuntu.com/3759-2/
reference_id USN-3759-2
reference_type
scores
url https://usn.ubuntu.com/3759-2/
39
reference_url https://usn.ubuntu.com/4986-1/
reference_id USN-4986-1
reference_type
scores
url https://usn.ubuntu.com/4986-1/
40
reference_url https://usn.ubuntu.com/4986-2/
reference_id USN-4986-2
reference_type
scores
url https://usn.ubuntu.com/4986-2/
fixed_packages
0
url pkg:deb/debian/libtirpc@0.2.5-1.2%2Bdeb9u1
purl pkg:deb/debian/libtirpc@0.2.5-1.2%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-17g3-3gth-nqh8
1
vulnerability VCID-7rgj-sndb-jugs
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtirpc@0.2.5-1.2%252Bdeb9u1
aliases CVE-2017-8779
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ubmz-6h4h-b7ae
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libtirpc@0.2.5-1%252Bdeb8u1