{"url":"http://public2.vulnerablecode.io/api/packages/571030?format=json","purl":"pkg:deb/debian/eglibc@2.13-38%2Bdeb7u8","type":"deb","namespace":"debian","name":"eglibc","version":"2.13-38+deb7u8","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"2.13-38+deb7u10","latest_non_vulnerable_version":"2.13-38+deb7u10","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58069?format=json","vulnerability_id":"VCID-6t8d-48g7-1yey","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html"},{"reference_url":"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0680.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2017-0680.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8779.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8779.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8779","reference_id":"","reference_type":"","scores":[{"value":"0.03578","scoring_system":"epss","scoring_elements":"0.87861","published_at":"2026-05-14T12:55:00Z"},{"value":"0.05548","scoring_system":"epss","scoring_elements":"0.90338","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05548","scoring_system":"epss","scoring_elements":"0.90333","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05548","scoring_system":"epss","scoring_elements":"0.90329","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05548","scoring_system":"epss","scoring_elements":"0.90298","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05548","scoring_system":"epss","scoring_elements":"0.90297","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05548","scoring_system":"epss","scoring_elements":"0.90294","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05548","scoring_system":"epss","scoring_elements":"0.90306","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05548","scoring_system":"epss","scoring_elements":"0.90322","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05694","scoring_system":"epss","scoring_elements":"0.90421","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05694","scoring_system":"epss","scoring_elements":"0.90423","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09682","scoring_system":"epss","scoring_elements":"0.92927","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09682","scoring_system":"epss","scoring_elements":"0.92897","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09682","scoring_system":"epss","scoring_elements":"0.92902","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09682","scoring_system":"epss","scoring_elements":"0.92901","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09682","scoring_system":"epss","scoring_elements":"0.92909","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09682","scoring_system":"epss","scoring_elements":"0.92914","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09682","scoring_system":"epss","scoring_elements":"0.92918","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09682","scoring_system":"epss","scoring_elements":"0.92916","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09682","scoring_system":"epss","scoring_elements":"0.92917","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09682","scoring_system":"epss","scoring_elements":"0.92889","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Sep/7","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Sep/7"},{"reference_url":"https://seclists.org/bugtraq/2019/Sep/7","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Sep/7"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=17905","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=17905"},{"reference_url":"https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html"},{"reference_url":"http://www.debian.org/security/2016/dsa-3480","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3480"},{"reference_url":"http://www.debian.org/security/2016/dsa-3481","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3481"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/19/11","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/19/11"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/20/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/20/1"},{"reference_url":"http://www.securityfocus.com/bid/82244","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/82244"},{"reference_url":"http://www.ubuntu.com/usn/USN-2985-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2985-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2985-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2985-2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300312","reference_id":"1300312","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300312"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812455","reference_id":"812455","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812455"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8779","reference_id":"CVE-2015-8779","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8779"},{"reference_url":"https://security.gentoo.org/glsa/201602-02","reference_id":"GLSA-201602-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-02"},{"reference_url":"https://security.gentoo.org/glsa/201702-11","reference_id":"GLSA-201702-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201702-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0680","reference_id":"RHSA-2017:0680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1916","reference_id":"RHSA-2017:1916","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1916"},{"reference_url":"https://usn.ubuntu.com/2985-1/","reference_id":"USN-2985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2985-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571409?format=json","purl":"pkg:deb/debian/eglibc@2.13-38%2Bdeb7u10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/eglibc@2.13-38%252Bdeb7u10"}],"aliases":["CVE-2015-8779"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6t8d-48g7-1yey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58062?format=json","vulnerability_id":"VCID-991k-es3s-hbg4","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8121.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8121.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8121","reference_id":"","reference_type":"","scores":[{"value":"0.02531","scoring_system":"epss","scoring_elements":"0.856","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86497","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86516","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86515","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86535","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86545","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.8656","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86557","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86549","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86564","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86487","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86562","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86581","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86589","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86588","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86609","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86628","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86644","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.8664","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86651","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86569","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1165192","reference_id":"1165192","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1165192"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779587","reference_id":"779587","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779587"},{"reference_url":"https://security.gentoo.org/glsa/201602-02","reference_id":"GLSA-201602-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0327","reference_id":"RHSA-2015:0327","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0327"},{"reference_url":"https://usn.ubuntu.com/2985-1/","reference_id":"USN-2985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2985-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571409?format=json","purl":"pkg:deb/debian/eglibc@2.13-38%2Bdeb7u10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/eglibc@2.13-38%252Bdeb7u10"}],"aliases":["CVE-2014-8121"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-991k-es3s-hbg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58067?format=json","vulnerability_id":"VCID-d1zs-8tg7-byhe","summary":"security update","references":[{"reference_url":"http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html","reference_id":"","reference_type":"","scores":[],"url":"http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8777.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8777.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8777","reference_id":"","reference_type":"","scores":[{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18743","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18695","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18879","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18932","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18654","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18733","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18787","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18791","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18745","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18644","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20938","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20858","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20943","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20917","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21017","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21072","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2105","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20923","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20925","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20892","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20784","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8777"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:S/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=18928","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=18928"},{"reference_url":"http://www.debian.org/security/2016/dsa-3480","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3480"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/20/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/20/1"},{"reference_url":"http://www.securityfocus.com/bid/81469","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/81469"},{"reference_url":"http://www.securitytracker.com/id/1034811","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034811"},{"reference_url":"http://www.ubuntu.com/usn/USN-2985-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2985-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2985-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2985-2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1260581","reference_id":"1260581","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1260581"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798316","reference_id":"798316","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798316"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8777","reference_id":"CVE-2015-8777","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:P/A:N"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8777"},{"reference_url":"https://security.gentoo.org/glsa/201702-11","reference_id":"GLSA-201702-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201702-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1916","reference_id":"RHSA-2017:1916","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1916"},{"reference_url":"https://usn.ubuntu.com/2985-1/","reference_id":"USN-2985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2985-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571409?format=json","purl":"pkg:deb/debian/eglibc@2.13-38%2Bdeb7u10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/eglibc@2.13-38%252Bdeb7u10"}],"aliases":["CVE-2015-8777"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d1zs-8tg7-byhe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58063?format=json","vulnerability_id":"VCID-ppaj-d4b9-wuhf","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1781.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1781.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1781","reference_id":"","reference_type":"","scores":[{"value":"0.04751","scoring_system":"epss","scoring_elements":"0.89534","published_at":"2026-05-14T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91643","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91649","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91657","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.9167","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91677","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.9168","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91682","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91679","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.917","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91636","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91693","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91698","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91696","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91694","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91706","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91718","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91727","published_at":"2026-05-09T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91726","published_at":"2026-05-11T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91735","published_at":"2026-05-12T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91692","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1199525","reference_id":"1199525","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1199525"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796105","reference_id":"796105","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796105"},{"reference_url":"https://security.gentoo.org/glsa/201602-02","reference_id":"GLSA-201602-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0863","reference_id":"RHSA-2015:0863","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0863"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2199","reference_id":"RHSA-2015:2199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2589","reference_id":"RHSA-2015:2589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2589"},{"reference_url":"https://usn.ubuntu.com/2985-1/","reference_id":"USN-2985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2985-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571409?format=json","purl":"pkg:deb/debian/eglibc@2.13-38%2Bdeb7u10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/eglibc@2.13-38%252Bdeb7u10"}],"aliases":["CVE-2015-1781"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ppaj-d4b9-wuhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58064?format=json","vulnerability_id":"VCID-r44h-gkxy-8kh2","summary":"security update","references":[{"reference_url":"http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow","reference_id":"","reference_type":"","scores":[],"url":"http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177412.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177412.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=145596041017029&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=145596041017029&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=145672440608228&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=145672440608228&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=145690841819314&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=145690841819314&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=145857691004892&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=145857691004892&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=146161017210491&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=146161017210491&w=2"},{"reference_url":"http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-Stack-Based-Buffer-Overflow.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-Stack-Based-Buffer-Overflow.html"},{"reference_url":"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"},{"reference_url":"http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html"},{"reference_url":"http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0175.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0175.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0176.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0176.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0225.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0225.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0277.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0277.html"},{"reference_url":"https://access.redhat.com/articles/2161461","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/articles/2161461"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7547.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7547.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7547","reference_id":"","reference_type":"","scores":[{"value":"0.93908","scoring_system":"epss","scoring_elements":"0.99875","published_at":"2026-04-04T12:55:00Z"},{"value":"0.93908","scoring_system":"epss","scoring_elements":"0.99874","published_at":"2026-04-01T12:55:00Z"},{"value":"0.93952","scoring_system":"epss","scoring_elements":"0.99886","published_at":"2026-05-14T12:55:00Z"},{"value":"0.93952","scoring_system":"epss","scoring_elements":"0.99884","published_at":"2026-04-16T12:55:00Z"},{"value":"0.93952","scoring_system":"epss","scoring_elements":"0.99885","published_at":"2026-05-11T12:55:00Z"},{"value":"0.93952","scoring_system":"epss","scoring_elements":"0.99882","published_at":"2026-04-08T12:55:00Z"},{"value":"0.93952","scoring_system":"epss","scoring_elements":"0.99883","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7547"},{"reference_url":"https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/","reference_id":"","reference_type":"","scores":[],"url":"https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/"},{"reference_url":"https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/","reference_id":"","reference_type":"","scores":[],"url":"https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa114","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa114"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Sep/7","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Sep/7"},{"reference_url":"http://seclists.org/fulldisclosure/2021/Sep/0","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2021/Sep/0"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Jun/36","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2022/Jun/36"},{"reference_url":"https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html","reference_id":"","reference_type":"","scores":[],"url":"https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html"},{"reference_url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05028479","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05028479"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05008367","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05008367"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05053211","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05053211"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05212266","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05212266"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"},{"reference_url":"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes","reference_id":"","reference_type":"","scores":[],"url":"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"},{"reference_url":"https://ics-cert.us-cert.gov/advisories/ICSA-16-103-01","reference_id":"","reference_type":"","scores":[],"url":"https://ics-cert.us-cert.gov/advisories/ICSA-16-103-01"},{"reference_url":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40161","reference_id":"","reference_type":"","scores":[],"url":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40161"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10150","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10150"},{"reference_url":"https://seclists.org/bugtraq/2019/Sep/7","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Sep/7"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160217-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20160217-0002/"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=18665","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=18665"},{"reference_url":"https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html"},{"reference_url":"https://support.f5.com/kb/en-us/solutions/public/k/47/sol47098834.html","reference_id":"","reference_type":"","scores":[],"url":"https://support.f5.com/kb/en-us/solutions/public/k/47/sol47098834.html"},{"reference_url":"https://support.lenovo.com/us/en/product_security/len_5450","reference_id":"","reference_type":"","scores":[],"url":"https://support.lenovo.com/us/en/product_security/len_5450"},{"reference_url":"http://support.citrix.com/article/CTX206991","reference_id":"","reference_type":"","scores":[],"url":"http://support.citrix.com/article/CTX206991"},{"reference_url":"https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17","reference_id":"","reference_type":"","scores":[],"url":"https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17"},{"reference_url":"https://www.exploit-db.com/exploits/39454/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/39454/"},{"reference_url":"https://www.exploit-db.com/exploits/40339/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/40339/"},{"reference_url":"https://www.kb.cert.org/vuls/id/457759","reference_id":"","reference_type":"","scores":[],"url":"https://www.kb.cert.org/vuls/id/457759"},{"reference_url":"https://www.tenable.com/security/research/tra-2017-08","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/research/tra-2017-08"},{"reference_url":"http://ubuntu.com/usn/usn-2900-1","reference_id":"","reference_type":"","scores":[],"url":"http://ubuntu.com/usn/usn-2900-1"},{"reference_url":"http://www.debian.org/security/2016/dsa-3480","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3480"},{"reference_url":"http://www.debian.org/security/2016/dsa-3481","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3481"},{"reference_url":"http://www.fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow","reference_id":"","reference_type":"","scores":[],"url":"http://www.fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow"},{"reference_url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160304-01-glibc-en","reference_id":"","reference_type":"","scores":[],"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160304-01-glibc-en"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"reference_url":"http://www.securityfocus.com/bid/83265","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/83265"},{"reference_url":"http://www.securitytracker.com/id/1035020","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035020"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2016-0002.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2016-0002.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1293532","reference_id":"1293532","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1293532"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:12.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:f5:big-ip_domain_name_system:12.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:12.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:hp:helion_openstack:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:2.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:hp:helion_openstack:2.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:2.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:2.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:hp:helion_openstack:2.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:2.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:server_migration_pack:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:hp:server_migration_pack:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:server_migration_pack:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:exalogic_infrastructure:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:exalogic_infrastructure:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:exalogic_infrastructure:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:exalogic_infrastructure:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:exalogic_infrastructure:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:exalogic_infrastructure:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sophos:unified_threat_management_software:9.319:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sophos:unified_threat_management_software:9.319:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sophos:unified_threat_management_software:9.319:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sophos:unified_threat_management_software:9.355:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sophos:unified_threat_management_software:9.355:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sophos:unified_threat_management_software:9.355:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:fujitsu_m10_firmware:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:fujitsu_m10_firmware:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:fujitsu_m10_firmware:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/39454.txt","reference_id":"CVE-2015-7547","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/39454.txt"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/40339.py","reference_id":"CVE-2015-7547","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/40339.py"},{"reference_url":"https://googleonlinesecurity.blogspot.kr/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html","reference_id":"CVE-2015-7547","reference_type":"exploit","scores":[],"url":"https://googleonlinesecurity.blogspot.kr/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html"},{"reference_url":"https://googleonlinesecurity.blogspot.sg/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html","reference_id":"CVE-2015-7547","reference_type":"exploit","scores":[],"url":"https://googleonlinesecurity.blogspot.sg/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7547","reference_id":"CVE-2015-7547","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7547"},{"reference_url":"https://security.gentoo.org/glsa/201602-02","reference_id":"GLSA-201602-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0175","reference_id":"RHSA-2016:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0175"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0176","reference_id":"RHSA-2016:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0176"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0225","reference_id":"RHSA-2016:0225","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0225"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0277","reference_id":"RHSA-2016:0277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0277"},{"reference_url":"https://usn.ubuntu.com/2900-1/","reference_id":"USN-2900-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2900-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571409?format=json","purl":"pkg:deb/debian/eglibc@2.13-38%2Bdeb7u10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/eglibc@2.13-38%252Bdeb7u10"}],"aliases":["CVE-2015-7547"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r44h-gkxy-8kh2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58066?format=json","vulnerability_id":"VCID-ru1q-qgq2-h7ct","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0680.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2017-0680.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8776.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8776.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8776","reference_id":"","reference_type":"","scores":[{"value":"0.03617","scoring_system":"epss","scoring_elements":"0.87914","published_at":"2026-05-14T12:55:00Z"},{"value":"0.04265","scoring_system":"epss","scoring_elements":"0.88891","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04265","scoring_system":"epss","scoring_elements":"0.88897","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04265","scoring_system":"epss","scoring_elements":"0.88901","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04265","scoring_system":"epss","scoring_elements":"0.88853","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04265","scoring_system":"epss","scoring_elements":"0.88858","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04265","scoring_system":"epss","scoring_elements":"0.88869","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04265","scoring_system":"epss","scoring_elements":"0.88885","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05306","scoring_system":"epss","scoring_elements":"0.90044","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05306","scoring_system":"epss","scoring_elements":"0.90041","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07412","scoring_system":"epss","scoring_elements":"0.91764","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07412","scoring_system":"epss","scoring_elements":"0.91702","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07412","scoring_system":"epss","scoring_elements":"0.9171","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07412","scoring_system":"epss","scoring_elements":"0.91715","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07412","scoring_system":"epss","scoring_elements":"0.91723","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07412","scoring_system":"epss","scoring_elements":"0.91735","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07412","scoring_system":"epss","scoring_elements":"0.91742","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07412","scoring_system":"epss","scoring_elements":"0.91745","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07412","scoring_system":"epss","scoring_elements":"0.91747","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07412","scoring_system":"epss","scoring_elements":"0.91743","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=18985","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=18985"},{"reference_url":"https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html"},{"reference_url":"http://www.debian.org/security/2016/dsa-3480","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3480"},{"reference_url":"http://www.debian.org/security/2016/dsa-3481","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3481"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/19/11","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/19/11"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/20/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/20/1"},{"reference_url":"http://www.securityfocus.com/bid/83277","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/83277"},{"reference_url":"http://www.ubuntu.com/usn/USN-2985-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2985-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2985-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2985-2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300299","reference_id":"1300299","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300299"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812445","reference_id":"812445","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812445"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8776","reference_id":"CVE-2015-8776","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:P"},{"value":"9.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8776"},{"reference_url":"https://security.gentoo.org/glsa/201602-02","reference_id":"GLSA-201602-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-02"},{"reference_url":"https://security.gentoo.org/glsa/201702-11","reference_id":"GLSA-201702-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201702-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0680","reference_id":"RHSA-2017:0680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1916","reference_id":"RHSA-2017:1916","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1916"},{"reference_url":"https://usn.ubuntu.com/2985-1/","reference_id":"USN-2985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2985-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571409?format=json","purl":"pkg:deb/debian/eglibc@2.13-38%2Bdeb7u10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/eglibc@2.13-38%252Bdeb7u10"}],"aliases":["CVE-2015-8776"],"risk_score":4.1,"exploitability":"0.5","weighted_severity":"8.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ru1q-qgq2-h7ct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58068?format=json","vulnerability_id":"VCID-weg2-kxcj-fkcg","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html"},{"reference_url":"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0680.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2017-0680.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8778.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8778.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8778","reference_id":"","reference_type":"","scores":[{"value":"0.04466","scoring_system":"epss","scoring_elements":"0.89187","published_at":"2026-05-14T12:55:00Z"},{"value":"0.05254","scoring_system":"epss","scoring_elements":"0.90048","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05254","scoring_system":"epss","scoring_elements":"0.90056","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05254","scoring_system":"epss","scoring_elements":"0.90016","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05254","scoring_system":"epss","scoring_elements":"0.90015","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05254","scoring_system":"epss","scoring_elements":"0.90014","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05254","scoring_system":"epss","scoring_elements":"0.90026","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05254","scoring_system":"epss","scoring_elements":"0.90041","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05254","scoring_system":"epss","scoring_elements":"0.90052","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06102","scoring_system":"epss","scoring_elements":"0.90802","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09807","scoring_system":"epss","scoring_elements":"0.92974","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09807","scoring_system":"epss","scoring_elements":"0.92936","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09807","scoring_system":"epss","scoring_elements":"0.92945","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09807","scoring_system":"epss","scoring_elements":"0.92949","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09807","scoring_system":"epss","scoring_elements":"0.92948","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09807","scoring_system":"epss","scoring_elements":"0.92956","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09807","scoring_system":"epss","scoring_elements":"0.9296","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09807","scoring_system":"epss","scoring_elements":"0.92965","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09807","scoring_system":"epss","scoring_elements":"0.92963","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09807","scoring_system":"epss","scoring_elements":"0.92964","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Sep/7","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Sep/7"},{"reference_url":"https://seclists.org/bugtraq/2019/Sep/7","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Sep/7"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=18240","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=18240"},{"reference_url":"https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html"},{"reference_url":"http://www.debian.org/security/2016/dsa-3480","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3480"},{"reference_url":"http://www.debian.org/security/2016/dsa-3481","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3481"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/19/11","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/19/11"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/20/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/20/1"},{"reference_url":"http://www.securityfocus.com/bid/83275","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/83275"},{"reference_url":"http://www.ubuntu.com/usn/USN-2985-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2985-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2985-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2985-2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300303","reference_id":"1300303","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300303"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812441","reference_id":"812441","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812441"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8778","reference_id":"CVE-2015-8778","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8778"},{"reference_url":"https://security.gentoo.org/glsa/201602-02","reference_id":"GLSA-201602-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-02"},{"reference_url":"https://security.gentoo.org/glsa/201702-11","reference_id":"GLSA-201702-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201702-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0680","reference_id":"RHSA-2017:0680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1916","reference_id":"RHSA-2017:1916","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1916"},{"reference_url":"https://usn.ubuntu.com/2985-1/","reference_id":"USN-2985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2985-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571409?format=json","purl":"pkg:deb/debian/eglibc@2.13-38%2Bdeb7u10","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/eglibc@2.13-38%252Bdeb7u10"}],"aliases":["CVE-2015-8778"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-weg2-kxcj-fkcg"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54361?format=json","vulnerability_id":"VCID-1971-5hzf-43dt","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html"},{"reference_url":"http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html"},{"reference_url":"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4043.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4043.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4043","reference_id":"","reference_type":"","scores":[{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.82151","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81888","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81899","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81922","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81918","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81945","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81952","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81972","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81961","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81956","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81991","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81993","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.82016","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.82027","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.82032","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.82051","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.82071","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.82096","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.82093","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.8211","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jun/18","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jun/18"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Sep/7","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Sep/7"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/93784","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/93784"},{"reference_url":"https://seclists.org/bugtraq/2019/Jun/14","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jun/14"},{"reference_url":"https://seclists.org/bugtraq/2019/Sep/7","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Sep/7"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=17048","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=17048"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=ChangeLog%3Bh=3020b9ac232315df362521aeaf85f21cb9926db8%3Bhp=d86e73963dd9fb5e21b1a28326630337226812aa%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=ChangeLog%3Bh=3020b9ac232315df362521aeaf85f21cb9926db8%3Bhp=d86e73963dd9fb5e21b1a28326630337226812aa%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=posix/spawn_faction_addopen.c%3Bh=40800b8e6e81341501c0fb8a91009529e2048dec%3Bhp=47f62425b696a4fdd511b2a057746322eb6518db%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=posix/spawn_faction_addopen.c%3Bh=40800b8e6e81341501c0fb8a91009529e2048dec%3Bhp=47f62425b696a4fdd511b2a057746322eb6518db%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=89e435f3559c53084498e9baad22172b64429362","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=89e435f3559c53084498e9baad22172b64429362"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:152","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:152"},{"reference_url":"http://www.securityfocus.com/bid/68006","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/68006"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1109263","reference_id":"1109263","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1109263"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751774","reference_id":"751774","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751774"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4043","reference_id":"CVE-2014-4043","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4043"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://usn.ubuntu.com/2306-1/","reference_id":"USN-2306-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2306-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571030?format=json","purl":"pkg:deb/debian/eglibc@2.13-38%2Bdeb7u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6t8d-48g7-1yey"},{"vulnerability":"VCID-991k-es3s-hbg4"},{"vulnerability":"VCID-d1zs-8tg7-byhe"},{"vulnerability":"VCID-ppaj-d4b9-wuhf"},{"vulnerability":"VCID-r44h-gkxy-8kh2"},{"vulnerability":"VCID-ru1q-qgq2-h7ct"},{"vulnerability":"VCID-weg2-kxcj-fkcg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/eglibc@2.13-38%252Bdeb7u8"}],"aliases":["CVE-2014-4043"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1971-5hzf-43dt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54360?format=json","vulnerability_id":"VCID-2pd1-hkrf-j7e5","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7424.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7424.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7424","reference_id":"","reference_type":"","scores":[{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74501","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74505","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74532","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74506","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74538","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74554","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74576","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74557","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74549","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74587","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74594","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74586","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74622","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74627","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74629","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74631","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74661","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74686","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74652","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74671","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74726","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7424"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1186614","reference_id":"1186614","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1186614"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1391","reference_id":"RHSA-2014:1391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1391"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1627","reference_id":"RHSA-2015:1627","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1627"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571030?format=json","purl":"pkg:deb/debian/eglibc@2.13-38%2Bdeb7u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6t8d-48g7-1yey"},{"vulnerability":"VCID-991k-es3s-hbg4"},{"vulnerability":"VCID-d1zs-8tg7-byhe"},{"vulnerability":"VCID-ppaj-d4b9-wuhf"},{"vulnerability":"VCID-r44h-gkxy-8kh2"},{"vulnerability":"VCID-ru1q-qgq2-h7ct"},{"vulnerability":"VCID-weg2-kxcj-fkcg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/eglibc@2.13-38%252Bdeb7u8"}],"aliases":["CVE-2013-7424"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2pd1-hkrf-j7e5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54364?format=json","vulnerability_id":"VCID-5g37-r914-r3g8","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1473.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1473.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1473","reference_id":"","reference_type":"","scores":[{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63503","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63563","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.6359","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63554","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63606","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63623","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63638","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63622","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63589","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63625","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63634","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63617","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63635","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63648","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63642","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63616","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63659","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63711","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63676","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63701","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63753","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1473"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1209105","reference_id":"1209105","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1209105"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777197","reference_id":"777197","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2199","reference_id":"RHSA-2015:2199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2589","reference_id":"RHSA-2015:2589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2589"},{"reference_url":"https://usn.ubuntu.com/2519-1/","reference_id":"USN-2519-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2519-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571030?format=json","purl":"pkg:deb/debian/eglibc@2.13-38%2Bdeb7u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6t8d-48g7-1yey"},{"vulnerability":"VCID-991k-es3s-hbg4"},{"vulnerability":"VCID-d1zs-8tg7-byhe"},{"vulnerability":"VCID-ppaj-d4b9-wuhf"},{"vulnerability":"VCID-r44h-gkxy-8kh2"},{"vulnerability":"VCID-ru1q-qgq2-h7ct"},{"vulnerability":"VCID-weg2-kxcj-fkcg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/eglibc@2.13-38%252Bdeb7u8"}],"aliases":["CVE-2015-1473"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5g37-r914-r3g8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54362?format=json","vulnerability_id":"VCID-aapy-xr76-zbc4","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9402.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9402.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9402","reference_id":"","reference_type":"","scores":[{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92444","published_at":"2026-04-01T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92451","published_at":"2026-04-02T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92459","published_at":"2026-04-04T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92474","published_at":"2026-04-08T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92479","published_at":"2026-04-09T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92485","published_at":"2026-04-11T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92487","published_at":"2026-04-12T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92486","published_at":"2026-04-13T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92496","published_at":"2026-04-18T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92499","published_at":"2026-04-21T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92501","published_at":"2026-04-24T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92502","published_at":"2026-04-26T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92498","published_at":"2026-04-29T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92508","published_at":"2026-05-05T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92518","published_at":"2026-05-07T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92529","published_at":"2026-05-09T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92533","published_at":"2026-05-11T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92539","published_at":"2026-05-12T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92564","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1175369","reference_id":"1175369","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1175369"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775572","reference_id":"775572","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775572"},{"reference_url":"https://security.gentoo.org/glsa/201602-02","reference_id":"GLSA-201602-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0805","reference_id":"RHSA-2018:0805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0805"},{"reference_url":"https://usn.ubuntu.com/2519-1/","reference_id":"USN-2519-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2519-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571030?format=json","purl":"pkg:deb/debian/eglibc@2.13-38%2Bdeb7u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6t8d-48g7-1yey"},{"vulnerability":"VCID-991k-es3s-hbg4"},{"vulnerability":"VCID-d1zs-8tg7-byhe"},{"vulnerability":"VCID-ppaj-d4b9-wuhf"},{"vulnerability":"VCID-r44h-gkxy-8kh2"},{"vulnerability":"VCID-ru1q-qgq2-h7ct"},{"vulnerability":"VCID-weg2-kxcj-fkcg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/eglibc@2.13-38%252Bdeb7u8"}],"aliases":["CVE-2014-9402"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aapy-xr76-zbc4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54363?format=json","vulnerability_id":"VCID-aq6k-yr6s-4ygw","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1472.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1472.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1472","reference_id":"","reference_type":"","scores":[{"value":"0.03056","scoring_system":"epss","scoring_elements":"0.86839","published_at":"2026-05-14T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89413","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89424","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89426","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89442","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89445","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89454","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89452","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89448","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89463","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89409","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89476","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.8948","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89481","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89488","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89507","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89521","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89517","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89527","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89461","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1188235","reference_id":"1188235","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1188235"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777197","reference_id":"777197","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777197"},{"reference_url":"https://security.gentoo.org/glsa/201602-02","reference_id":"GLSA-201602-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2199","reference_id":"RHSA-2015:2199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2589","reference_id":"RHSA-2015:2589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2589"},{"reference_url":"https://usn.ubuntu.com/2519-1/","reference_id":"USN-2519-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2519-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571030?format=json","purl":"pkg:deb/debian/eglibc@2.13-38%2Bdeb7u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6t8d-48g7-1yey"},{"vulnerability":"VCID-991k-es3s-hbg4"},{"vulnerability":"VCID-d1zs-8tg7-byhe"},{"vulnerability":"VCID-ppaj-d4b9-wuhf"},{"vulnerability":"VCID-r44h-gkxy-8kh2"},{"vulnerability":"VCID-ru1q-qgq2-h7ct"},{"vulnerability":"VCID-weg2-kxcj-fkcg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/eglibc@2.13-38%252Bdeb7u8"}],"aliases":["CVE-2015-1472"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aq6k-yr6s-4ygw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54412?format=json","vulnerability_id":"VCID-e9fg-s2r5-qfc2","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6656.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6656.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6656","reference_id":"","reference_type":"","scores":[{"value":"0.01184","scoring_system":"epss","scoring_elements":"0.78961","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78936","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78964","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78948","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78972","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78978","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79002","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78987","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78976","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.7893","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79001","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79032","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79038","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79069","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79089","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79106","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79104","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79119","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79004","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=14134","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=14134"},{"reference_url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=6e230d11837f3ae7b375ea69d7905f0d18eb79e5","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=6e230d11837f3ae7b375ea69d7905f0d18eb79e5"},{"reference_url":"http://www.debian.org/security/2015/dsa-3142","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3142"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:175","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:175"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/08/29/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/08/29/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/09/02/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/09/02/1"},{"reference_url":"http://www.securityfocus.com/bid/69472","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/69472"},{"reference_url":"http://www.ubuntu.com/usn/USN-2432-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2432-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1135840","reference_id":"1135840","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1135840"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6656","reference_id":"CVE-2012-6656","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6656"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://usn.ubuntu.com/2432-1/","reference_id":"USN-2432-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2432-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571030?format=json","purl":"pkg:deb/debian/eglibc@2.13-38%2Bdeb7u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6t8d-48g7-1yey"},{"vulnerability":"VCID-991k-es3s-hbg4"},{"vulnerability":"VCID-d1zs-8tg7-byhe"},{"vulnerability":"VCID-ppaj-d4b9-wuhf"},{"vulnerability":"VCID-r44h-gkxy-8kh2"},{"vulnerability":"VCID-ru1q-qgq2-h7ct"},{"vulnerability":"VCID-weg2-kxcj-fkcg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/eglibc@2.13-38%252Bdeb7u8"}],"aliases":["CVE-2012-6656"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e9fg-s2r5-qfc2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54359?format=json","vulnerability_id":"VCID-hkyd-8rrg-v3e7","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3406.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3406.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3406","reference_id":"","reference_type":"","scores":[{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75132","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75135","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75165","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75142","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75176","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75188","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75209","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75187","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75213","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75219","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75208","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75246","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.7525","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75254","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75263","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75291","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75316","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75297","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75305","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.7536","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681888","reference_id":"681888","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681888"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=826943","reference_id":"826943","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=826943"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1097","reference_id":"RHSA-2012:1097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1098","reference_id":"RHSA-2012:1098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1200","reference_id":"RHSA-2012:1200","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1200"},{"reference_url":"https://usn.ubuntu.com/1589-1/","reference_id":"USN-1589-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1589-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571030?format=json","purl":"pkg:deb/debian/eglibc@2.13-38%2Bdeb7u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6t8d-48g7-1yey"},{"vulnerability":"VCID-991k-es3s-hbg4"},{"vulnerability":"VCID-d1zs-8tg7-byhe"},{"vulnerability":"VCID-ppaj-d4b9-wuhf"},{"vulnerability":"VCID-r44h-gkxy-8kh2"},{"vulnerability":"VCID-ru1q-qgq2-h7ct"},{"vulnerability":"VCID-weg2-kxcj-fkcg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/eglibc@2.13-38%252Bdeb7u8"}],"aliases":["CVE-2012-3406"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hkyd-8rrg-v3e7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54413?format=json","vulnerability_id":"VCID-kwbk-pngd-3bh9","summary":"security update","references":[{"reference_url":"http://linux.oracle.com/errata/ELSA-2015-0016.html","reference_id":"","reference_type":"","scores":[],"url":"http://linux.oracle.com/errata/ELSA-2015-0016.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6040.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6040.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6040","reference_id":"","reference_type":"","scores":[{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.91659","published_at":"2026-05-14T12:55:00Z"},{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.91544","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.91551","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.91558","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.91566","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.91579","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.91585","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.91589","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.91591","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.91612","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.91606","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.91614","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.9161","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.91622","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.91635","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.91645","published_at":"2026-05-09T12:55:00Z"},{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.91643","published_at":"2026-05-11T12:55:00Z"},{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.91653","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235"},{"reference_url":"http://secunia.com/advisories/62100","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62100"},{"reference_url":"http://secunia.com/advisories/62146","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62146"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=17325","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=17325"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=41488498b6","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=41488498b6"},{"reference_url":"http://ubuntu.com/usn/usn-2432-1","reference_id":"","reference_type":"","scores":[],"url":"http://ubuntu.com/usn/usn-2432-1"},{"reference_url":"http://www.debian.org/security/2015/dsa-3142","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3142"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:175","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:175"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/08/29/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/08/29/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/09/02/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/09/02/1"},{"reference_url":"http://www.securityfocus.com/bid/69472","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/69472"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1135841","reference_id":"1135841","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1135841"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-6040","reference_id":"CVE-2014-6040","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-6040"},{"reference_url":"https://security.gentoo.org/glsa/201602-02","reference_id":"GLSA-201602-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0016","reference_id":"RHSA-2015:0016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0327","reference_id":"RHSA-2015:0327","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0327"},{"reference_url":"https://usn.ubuntu.com/2432-1/","reference_id":"USN-2432-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2432-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571030?format=json","purl":"pkg:deb/debian/eglibc@2.13-38%2Bdeb7u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6t8d-48g7-1yey"},{"vulnerability":"VCID-991k-es3s-hbg4"},{"vulnerability":"VCID-d1zs-8tg7-byhe"},{"vulnerability":"VCID-ppaj-d4b9-wuhf"},{"vulnerability":"VCID-r44h-gkxy-8kh2"},{"vulnerability":"VCID-ru1q-qgq2-h7ct"},{"vulnerability":"VCID-weg2-kxcj-fkcg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/eglibc@2.13-38%252Bdeb7u8"}],"aliases":["CVE-2014-6040"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kwbk-pngd-3bh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54415?format=json","vulnerability_id":"VCID-mt93-6b2q-1faf","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0235.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0235.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0235","reference_id":"","reference_type":"","scores":[{"value":"0.8487","scoring_system":"epss","scoring_elements":"0.99349","published_at":"2026-04-21T12:55:00Z"},{"value":"0.8487","scoring_system":"epss","scoring_elements":"0.99347","published_at":"2026-04-13T12:55:00Z"},{"value":"0.8487","scoring_system":"epss","scoring_elements":"0.9935","published_at":"2026-04-18T12:55:00Z"},{"value":"0.86662","scoring_system":"epss","scoring_elements":"0.9942","published_at":"2026-04-11T12:55:00Z"},{"value":"0.86662","scoring_system":"epss","scoring_elements":"0.99431","published_at":"2026-05-14T12:55:00Z"},{"value":"0.86662","scoring_system":"epss","scoring_elements":"0.99415","published_at":"2026-04-02T12:55:00Z"},{"value":"0.86662","scoring_system":"epss","scoring_elements":"0.99417","published_at":"2026-04-04T12:55:00Z"},{"value":"0.86662","scoring_system":"epss","scoring_elements":"0.99428","published_at":"2026-05-11T12:55:00Z"},{"value":"0.86662","scoring_system":"epss","scoring_elements":"0.9943","published_at":"2026-05-12T12:55:00Z"},{"value":"0.86662","scoring_system":"epss","scoring_elements":"0.99416","published_at":"2026-04-01T12:55:00Z"},{"value":"0.86662","scoring_system":"epss","scoring_elements":"0.99426","published_at":"2026-04-29T12:55:00Z"},{"value":"0.86662","scoring_system":"epss","scoring_elements":"0.99427","published_at":"2026-05-07T12:55:00Z"},{"value":"0.86966","scoring_system":"epss","scoring_elements":"0.99432","published_at":"2026-04-09T12:55:00Z"},{"value":"0.86966","scoring_system":"epss","scoring_elements":"0.99431","published_at":"2026-04-08T12:55:00Z"},{"value":"0.86966","scoring_system":"epss","scoring_elements":"0.9943","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0235"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183461","reference_id":"1183461","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183461"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35951.py","reference_id":"CVE-2015-0235;OSVDB-117579","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35951.py"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/36421.rb","reference_id":"CVE-2015-0235;OSVDB-117579","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/36421.rb"},{"reference_url":"https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt","reference_id":"CVE-2015-0235;OSVDB-117579","reference_type":"exploit","scores":[],"url":"https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0090","reference_id":"RHSA-2015:0090","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0090"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0092","reference_id":"RHSA-2015:0092","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0092"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0099","reference_id":"RHSA-2015:0099","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0101","reference_id":"RHSA-2015:0101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0126","reference_id":"RHSA-2015:0126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0126"},{"reference_url":"https://usn.ubuntu.com/2485-1/","reference_id":"USN-2485-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2485-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571030?format=json","purl":"pkg:deb/debian/eglibc@2.13-38%2Bdeb7u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6t8d-48g7-1yey"},{"vulnerability":"VCID-991k-es3s-hbg4"},{"vulnerability":"VCID-d1zs-8tg7-byhe"},{"vulnerability":"VCID-ppaj-d4b9-wuhf"},{"vulnerability":"VCID-r44h-gkxy-8kh2"},{"vulnerability":"VCID-ru1q-qgq2-h7ct"},{"vulnerability":"VCID-weg2-kxcj-fkcg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/eglibc@2.13-38%252Bdeb7u8"}],"aliases":["CVE-2015-0235"],"risk_score":1.6,"exploitability":"2.0","weighted_severity":"0.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mt93-6b2q-1faf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54414?format=json","vulnerability_id":"VCID-ywmm-hzmg-z3b4","summary":"security update","references":[{"reference_url":"http://linux.oracle.com/errata/ELSA-2015-0016.html","reference_id":"","reference_type":"","scores":[],"url":"http://linux.oracle.com/errata/ELSA-2015-0016.html"},{"reference_url":"http://linux.oracle.com/errata/ELSA-2015-0092.html","reference_id":"","reference_type":"","scores":[],"url":"http://linux.oracle.com/errata/ELSA-2015-0092.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-02/msg00089.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-02/msg00089.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-2023.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-2023.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7817.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7817.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-7817","reference_id":"","reference_type":"","scores":[{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36212","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36536","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36708","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36577","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.3663","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36647","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36655","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36621","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36596","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36642","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36625","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36566","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36342","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36312","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36226","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36109","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36178","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36206","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36118","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36141","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-7817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235"},{"reference_url":"http://seclists.org/oss-sec/2014/q4/730","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/oss-sec/2014/q4/730"},{"reference_url":"http://secunia.com/advisories/62100","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62100"},{"reference_url":"http://secunia.com/advisories/62146","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62146"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/98852","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/98852"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=17625","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=17625"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=a39208bd7fb76c1b01c127b4c61f9bfd915bfe7c","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=a39208bd7fb76c1b01c127b4c61f9bfd915bfe7c"},{"reference_url":"https://sourceware.org/ml/libc-alpha/2014-11/msg00519.html","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/ml/libc-alpha/2014-11/msg00519.html"},{"reference_url":"http://www.debian.org/security/2015/dsa-3142","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3142"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"reference_url":"http://www.securityfocus.com/bid/71216","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71216"},{"reference_url":"http://www.ubuntu.com/usn/USN-2432-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2432-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1157689","reference_id":"1157689","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1157689"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775572","reference_id":"775572","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775572"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-7817","reference_id":"CVE-2014-7817","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-7817"},{"reference_url":"https://security.gentoo.org/glsa/201602-02","reference_id":"GLSA-201602-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:2023","reference_id":"RHSA-2014:2023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:2023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0016","reference_id":"RHSA-2015:0016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0016"},{"reference_url":"https://usn.ubuntu.com/2432-1/","reference_id":"USN-2432-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2432-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/571030?format=json","purl":"pkg:deb/debian/eglibc@2.13-38%2Bdeb7u8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6t8d-48g7-1yey"},{"vulnerability":"VCID-991k-es3s-hbg4"},{"vulnerability":"VCID-d1zs-8tg7-byhe"},{"vulnerability":"VCID-ppaj-d4b9-wuhf"},{"vulnerability":"VCID-r44h-gkxy-8kh2"},{"vulnerability":"VCID-ru1q-qgq2-h7ct"},{"vulnerability":"VCID-weg2-kxcj-fkcg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/eglibc@2.13-38%252Bdeb7u8"}],"aliases":["CVE-2014-7817"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ywmm-hzmg-z3b4"}],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/eglibc@2.13-38%252Bdeb7u8"}