{"url":"http://public2.vulnerablecode.io/api/packages/449912?format=json","purl":"pkg:apk/alpine/clamav@0.103.2-r0?arch=armhf&distroversion=v3.12&reponame=main","type":"apk","namespace":"alpine","name":"clamav","version":"0.103.2-r0","qualifiers":{"arch":"armhf","distroversion":"v3.12","reponame":"main"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"0.103.6-r0","latest_non_vulnerable_version":"0.103.6-r0","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94647?format=json","vulnerability_id":"VCID-egd5-p68y-wfdy","summary":"A vulnerability in the PDF parsing module in Clam AntiVirus (ClamAV) Software versions 0.103.0 and 0.103.1 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper buffer size tracking that may result in a heap buffer over-read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to crash, resulting in a denial of service condition.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1404","reference_id":"","reference_type":"","scores":[{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63588","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63608","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63621","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63615","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63475","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63534","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63562","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63527","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63579","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63596","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63611","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63598","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.63607","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00448","scoring_system":"epss","scoring_elements":"0.6359","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1404"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986622","reference_id":"986622","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986622"},{"reference_url":"https://security.archlinux.org/AVG-1787","reference_id":"AVG-1787","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1787"},{"reference_url":"https://blog.clamav.net/2021/04/clamav-01032-security-patch-release.html","reference_id":"clamav-01032-security-patch-release.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-08T20:02:31Z/"}],"url":"https://blog.clamav.net/2021/04/clamav-01032-security-patch-release.html"},{"reference_url":"https://usn.ubuntu.com/4918-1/","reference_id":"USN-4918-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4918-1/"},{"reference_url":"https://usn.ubuntu.com/4918-2/","reference_id":"USN-4918-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4918-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/449912?format=json","purl":"pkg:apk/alpine/clamav@0.103.2-r0?arch=armhf&distroversion=v3.12&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/clamav@0.103.2-r0%3Farch=armhf&distroversion=v3.12&reponame=main"}],"aliases":["CVE-2021-1404"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-egd5-p68y-wfdy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40170?format=json","vulnerability_id":"VCID-new8-u5x9-nkeb","summary":"A vulnerability in ClamAV could lead to a Denial of Service\n    condition.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1405","reference_id":"","reference_type":"","scores":[{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81156","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81068","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81106","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81108","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81105","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81129","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81136","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81143","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81005","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81014","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81037","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81064","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81071","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81089","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01493","scoring_system":"epss","scoring_elements":"0.81075","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1405"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986622","reference_id":"986622","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986622"},{"reference_url":"https://security.archlinux.org/AVG-1787","reference_id":"AVG-1787","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1787"},{"reference_url":"https://blog.clamav.net/2021/04/clamav-01032-security-patch-release.html","reference_id":"clamav-01032-security-patch-release.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-08T20:02:34Z/"}],"url":"https://blog.clamav.net/2021/04/clamav-01032-security-patch-release.html"},{"reference_url":"https://security.gentoo.org/glsa/202104-07","reference_id":"GLSA-202104-07","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-08T20:02:34Z/"}],"url":"https://security.gentoo.org/glsa/202104-07"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/04/msg00012.html","reference_id":"msg00012.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-08T20:02:34Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2021/04/msg00012.html"},{"reference_url":"https://usn.ubuntu.com/4918-1/","reference_id":"USN-4918-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4918-1/"},{"reference_url":"https://usn.ubuntu.com/4918-2/","reference_id":"USN-4918-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4918-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/449912?format=json","purl":"pkg:apk/alpine/clamav@0.103.2-r0?arch=armhf&distroversion=v3.12&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/clamav@0.103.2-r0%3Farch=armhf&distroversion=v3.12&reponame=main"}],"aliases":["CVE-2021-1405"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-new8-u5x9-nkeb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94646?format=json","vulnerability_id":"VCID-xwgq-w8k4-xbcn","summary":"A vulnerability in the Excel XLM macro parsing module in Clam AntiVirus (ClamAV) Software versions 0.103.0 and 0.103.1 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper error handling that may result in an infinite loop. An attacker could exploit this vulnerability by sending a crafted Excel file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process hang, resulting in a denial of service condition.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1252","reference_id":"","reference_type":"","scores":[{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67624","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67634","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67645","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67647","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67514","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.6755","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67571","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67549","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.676","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67614","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67637","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67623","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.6759","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67625","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67616","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-1252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1252"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986622","reference_id":"986622","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=986622"},{"reference_url":"https://security.archlinux.org/AVG-1787","reference_id":"AVG-1787","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1787"},{"reference_url":"https://blog.clamav.net/2021/04/clamav-01032-security-patch-release.html","reference_id":"clamav-01032-security-patch-release.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-08T20:02:36Z/"}],"url":"https://blog.clamav.net/2021/04/clamav-01032-security-patch-release.html"},{"reference_url":"https://usn.ubuntu.com/4918-1/","reference_id":"USN-4918-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4918-1/"},{"reference_url":"https://usn.ubuntu.com/4918-2/","reference_id":"USN-4918-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4918-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/449912?format=json","purl":"pkg:apk/alpine/clamav@0.103.2-r0?arch=armhf&distroversion=v3.12&reponame=main","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/clamav@0.103.2-r0%3Farch=armhf&distroversion=v3.12&reponame=main"}],"aliases":["CVE-2021-1252"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xwgq-w8k4-xbcn"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/clamav@0.103.2-r0%3Farch=armhf&distroversion=v3.12&reponame=main"}