{"url":"http://public2.vulnerablecode.io/api/packages/449686?format=json","purl":"pkg:apk/alpine/clamav@0.102.3-r0?arch=ppc64le&distroversion=v3.14&reponame=community","type":"apk","namespace":"alpine","name":"clamav","version":"0.102.3-r0","qualifiers":{"arch":"ppc64le","distroversion":"v3.14","reponame":"community"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"0.102.4-r0","latest_non_vulnerable_version":"0.103.2-r0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43029?format=json","vulnerability_id":"VCID-cc9p-w184-zfej","summary":"Multiple vulnerabilities have been found in ClamAV, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-3327","reference_id":"","reference_type":"","scores":[{"value":"0.07618","scoring_system":"epss","scoring_elements":"0.91822","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07618","scoring_system":"epss","scoring_elements":"0.9183","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07618","scoring_system":"epss","scoring_elements":"0.91836","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07618","scoring_system":"epss","scoring_elements":"0.91845","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07618","scoring_system":"epss","scoring_elements":"0.91857","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07618","scoring_system":"epss","scoring_elements":"0.91863","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07618","scoring_system":"epss","scoring_elements":"0.91866","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07618","scoring_system":"epss","scoring_elements":"0.91867","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07618","scoring_system":"epss","scoring_elements":"0.91862","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-3327"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3327","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3327"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3BMTC7I5LGY4FCIZLHPNC4WWC6VNLFER/","reference_id":"3BMTC7I5LGY4FCIZLHPNC4WWC6VNLFER","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:23Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3BMTC7I5LGY4FCIZLHPNC4WWC6VNLFER/"},{"reference_url":"https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html","reference_id":"clamav-01023-security-patch-released.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:23Z/"}],"url":"https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html"},{"reference_url":"https://security.gentoo.org/glsa/202007-23","reference_id":"GLSA-202007-23","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:23Z/"}],"url":"https://security.gentoo.org/glsa/202007-23"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IJ67VH37NCG25PICGWFWZHSVG7PBT7MC/","reference_id":"IJ67VH37NCG25PICGWFWZHSVG7PBT7MC","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:23Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IJ67VH37NCG25PICGWFWZHSVG7PBT7MC/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5YWYT27SBTV4RZSGFHIQUI4LQVFASWS/","reference_id":"L5YWYT27SBTV4RZSGFHIQUI4LQVFASWS","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:23Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5YWYT27SBTV4RZSGFHIQUI4LQVFASWS/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00010.html","reference_id":"msg00010.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:23Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00010.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/05/msg00018.html","reference_id":"msg00018.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:23Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/05/msg00018.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QM7EXJHDEZJLWM2NKH6TCDXOBP5NNYIN/","reference_id":"QM7EXJHDEZJLWM2NKH6TCDXOBP5NNYIN","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:23Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QM7EXJHDEZJLWM2NKH6TCDXOBP5NNYIN/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROBJOGJOT44MVDX7RQEACYHQN4LYW5RK/","reference_id":"ROBJOGJOT44MVDX7RQEACYHQN4LYW5RK","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:23Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROBJOGJOT44MVDX7RQEACYHQN4LYW5RK/"},{"reference_url":"https://usn.ubuntu.com/4370-1/","reference_id":"USN-4370-1","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:23Z/"}],"url":"https://usn.ubuntu.com/4370-1/"},{"reference_url":"https://usn.ubuntu.com/4370-2/","reference_id":"USN-4370-2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:23Z/"}],"url":"https://usn.ubuntu.com/4370-2/"},{"reference_url":"https://usn.ubuntu.com/4435-1/","reference_id":"USN-4435-1","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:23Z/"}],"url":"https://usn.ubuntu.com/4435-1/"},{"reference_url":"https://usn.ubuntu.com/4435-2/","reference_id":"USN-4435-2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:23Z/"}],"url":"https://usn.ubuntu.com/4435-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/449686?format=json","purl":"pkg:apk/alpine/clamav@0.102.3-r0?arch=ppc64le&distroversion=v3.14&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/clamav@0.102.3-r0%3Farch=ppc64le&distroversion=v3.14&reponame=community"}],"aliases":["CVE-2020-3327"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cc9p-w184-zfej"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94570?format=json","vulnerability_id":"VCID-vbmy-urt6-myha","summary":"A vulnerability in the PDF archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.101 - 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a stack buffer overflow read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-3341","reference_id":"","reference_type":"","scores":[{"value":"0.04089","scoring_system":"epss","scoring_elements":"0.88522","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04089","scoring_system":"epss","scoring_elements":"0.8853","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04089","scoring_system":"epss","scoring_elements":"0.88547","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04089","scoring_system":"epss","scoring_elements":"0.88551","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04089","scoring_system":"epss","scoring_elements":"0.88569","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04089","scoring_system":"epss","scoring_elements":"0.88574","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04089","scoring_system":"epss","scoring_elements":"0.88586","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04089","scoring_system":"epss","scoring_elements":"0.88578","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04089","scoring_system":"epss","scoring_elements":"0.88579","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-3341"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3341","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3341"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3BMTC7I5LGY4FCIZLHPNC4WWC6VNLFER/","reference_id":"3BMTC7I5LGY4FCIZLHPNC4WWC6VNLFER","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3BMTC7I5LGY4FCIZLHPNC4WWC6VNLFER/"},{"reference_url":"https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html","reference_id":"clamav-01023-security-patch-released.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:21Z/"}],"url":"https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5YWYT27SBTV4RZSGFHIQUI4LQVFASWS/","reference_id":"L5YWYT27SBTV4RZSGFHIQUI4LQVFASWS","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5YWYT27SBTV4RZSGFHIQUI4LQVFASWS/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/05/msg00018.html","reference_id":"msg00018.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:21Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2020/05/msg00018.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROBJOGJOT44MVDX7RQEACYHQN4LYW5RK/","reference_id":"ROBJOGJOT44MVDX7RQEACYHQN4LYW5RK","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:21Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROBJOGJOT44MVDX7RQEACYHQN4LYW5RK/"},{"reference_url":"https://usn.ubuntu.com/4370-1/","reference_id":"USN-4370-1","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:21Z/"}],"url":"https://usn.ubuntu.com/4370-1/"},{"reference_url":"https://usn.ubuntu.com/4370-2/","reference_id":"USN-4370-2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-15T16:21:21Z/"}],"url":"https://usn.ubuntu.com/4370-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/449686?format=json","purl":"pkg:apk/alpine/clamav@0.102.3-r0?arch=ppc64le&distroversion=v3.14&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/clamav@0.102.3-r0%3Farch=ppc64le&distroversion=v3.14&reponame=community"}],"aliases":["CVE-2020-3341"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vbmy-urt6-myha"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/clamav@0.102.3-r0%3Farch=ppc64le&distroversion=v3.14&reponame=community"}