Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/audiofile@0.3.6-4?distro=trixie
Typedeb
Namespacedebian
Nameaudiofile
Version0.3.6-4
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version0.3.6-5
Latest_non_vulnerable_version0.3.6-7
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2fxt-mcp5-vkdz
vulnerability_id VCID-2fxt-mcp5-vkdz
summary audiofile: Index out of bounds for type int16_t
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6837.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6837.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6837
reference_id
reference_type
scores
0
value 0.06086
scoring_system epss
scoring_elements 0.90718
published_at 2026-04-01T12:55:00Z
1
value 0.06086
scoring_system epss
scoring_elements 0.90768
published_at 2026-04-13T12:55:00Z
2
value 0.06086
scoring_system epss
scoring_elements 0.90746
published_at 2026-04-07T12:55:00Z
3
value 0.06086
scoring_system epss
scoring_elements 0.90757
published_at 2026-04-08T12:55:00Z
4
value 0.06086
scoring_system epss
scoring_elements 0.90763
published_at 2026-04-09T12:55:00Z
5
value 0.06086
scoring_system epss
scoring_elements 0.90771
published_at 2026-04-12T12:55:00Z
6
value 0.06086
scoring_system epss
scoring_elements 0.90724
published_at 2026-04-02T12:55:00Z
7
value 0.06086
scoring_system epss
scoring_elements 0.90735
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6837
2
reference_url https://blogs.gentoo.org/ago/2017/02/20/audiofile-multiple-ubsan-crashes/
reference_id
reference_type
scores
url https://blogs.gentoo.org/ago/2017/02/20/audiofile-multiple-ubsan-crashes/
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://github.com/antlarr/audiofile/commit/c48e4c6503f7dabd41f11d4c9c7b7f8960e7f2c0
reference_id
reference_type
scores
url https://github.com/antlarr/audiofile/commit/c48e4c6503f7dabd41f11d4c9c7b7f8960e7f2c0
18
reference_url https://github.com/mpruett/audiofile/issues/41
reference_id
reference_type
scores
url https://github.com/mpruett/audiofile/issues/41
19
reference_url http://www.debian.org/security/2017/dsa-3814
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3814
20
reference_url http://www.openwall.com/lists/oss-security/2017/03/13/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/03/13/9
21
reference_url http://www.securityfocus.com/bid/97314
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97314
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1432942
reference_id 1432942
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1432942
23
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857651
reference_id 857651
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857651
24
reference_url https://security.archlinux.org/ASA-201708-9
reference_id ASA-201708-9
reference_type
scores
url https://security.archlinux.org/ASA-201708-9
25
reference_url https://security.archlinux.org/AVG-205
reference_id AVG-205
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-205
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-6837
reference_id CVE-2017-6837
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-6837
28
reference_url https://usn.ubuntu.com/3241-1/
reference_id USN-3241-1
reference_type
scores
url https://usn.ubuntu.com/3241-1/
fixed_packages
0
url pkg:deb/debian/audiofile@0.3.6-4?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-4%3Fdistro=trixie
1
url pkg:deb/debian/audiofile@0.3.6-5?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-5%3Fdistro=trixie
2
url pkg:deb/debian/audiofile@0.3.6-5%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-5%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-5%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/audiofile@0.3.6-7?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-7%3Fdistro=trixie
aliases CVE-2017-6837
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2fxt-mcp5-vkdz
1
url VCID-411s-5r62-zubr
vulnerability_id VCID-411s-5r62-zubr
summary audiofile: Heap-based buffer overflow in readValue
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6828.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6828.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6828
reference_id
reference_type
scores
0
value 0.17241
scoring_system epss
scoring_elements 0.95028
published_at 2026-04-13T12:55:00Z
1
value 0.21753
scoring_system epss
scoring_elements 0.9571
published_at 2026-04-01T12:55:00Z
2
value 0.21753
scoring_system epss
scoring_elements 0.95719
published_at 2026-04-02T12:55:00Z
3
value 0.21753
scoring_system epss
scoring_elements 0.95727
published_at 2026-04-04T12:55:00Z
4
value 0.21753
scoring_system epss
scoring_elements 0.9573
published_at 2026-04-07T12:55:00Z
5
value 0.21753
scoring_system epss
scoring_elements 0.95739
published_at 2026-04-08T12:55:00Z
6
value 0.21753
scoring_system epss
scoring_elements 0.95742
published_at 2026-04-09T12:55:00Z
7
value 0.21753
scoring_system epss
scoring_elements 0.95746
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6828
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1432925
reference_id 1432925
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1432925
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857651
reference_id 857651
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857651
17
reference_url https://security.archlinux.org/ASA-201708-9
reference_id ASA-201708-9
reference_type
scores
url https://security.archlinux.org/ASA-201708-9
18
reference_url https://security.archlinux.org/AVG-205
reference_id AVG-205
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-205
19
reference_url https://usn.ubuntu.com/3241-1/
reference_id USN-3241-1
reference_type
scores
url https://usn.ubuntu.com/3241-1/
fixed_packages
0
url pkg:deb/debian/audiofile@0.3.6-4?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-4%3Fdistro=trixie
1
url pkg:deb/debian/audiofile@0.3.6-5?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-5%3Fdistro=trixie
2
url pkg:deb/debian/audiofile@0.3.6-5%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-5%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-5%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/audiofile@0.3.6-7?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-7%3Fdistro=trixie
aliases CVE-2017-6828
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-411s-5r62-zubr
2
url VCID-5ckf-qbbb-57f7
vulnerability_id VCID-5ckf-qbbb-57f7
summary audiofile: Heap-based buffer overflow in IMA::decodeBlockWAVE
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6831.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6831.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6831
reference_id
reference_type
scores
0
value 0.02789
scoring_system epss
scoring_elements 0.86083
published_at 2026-04-13T12:55:00Z
1
value 0.04517
scoring_system epss
scoring_elements 0.891
published_at 2026-04-01T12:55:00Z
2
value 0.04517
scoring_system epss
scoring_elements 0.89149
published_at 2026-04-09T12:55:00Z
3
value 0.04517
scoring_system epss
scoring_elements 0.8916
published_at 2026-04-11T12:55:00Z
4
value 0.04517
scoring_system epss
scoring_elements 0.89156
published_at 2026-04-12T12:55:00Z
5
value 0.04517
scoring_system epss
scoring_elements 0.89109
published_at 2026-04-02T12:55:00Z
6
value 0.04517
scoring_system epss
scoring_elements 0.89123
published_at 2026-04-04T12:55:00Z
7
value 0.04517
scoring_system epss
scoring_elements 0.89126
published_at 2026-04-07T12:55:00Z
8
value 0.04517
scoring_system epss
scoring_elements 0.89144
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6831
2
reference_url https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-imadecodeblockwave-ima-cpp/
reference_id
reference_type
scores
url https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-imadecodeblockwave-ima-cpp/
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839
16
reference_url https://github.com/antlarr/audiofile/commit/a2e9eab8ea87c4ffc494d839ebb4ea145eb9f2e6
reference_id
reference_type
scores
url https://github.com/antlarr/audiofile/commit/a2e9eab8ea87c4ffc494d839ebb4ea145eb9f2e6
17
reference_url https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2017-6831
reference_id
reference_type
scores
url https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2017-6831
18
reference_url https://github.com/mpruett/audiofile/issues/35
reference_id
reference_type
scores
url https://github.com/mpruett/audiofile/issues/35
19
reference_url http://www.debian.org/security/2017/dsa-3814
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3814
20
reference_url http://www.openwall.com/lists/oss-security/2017/03/13/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/03/13/3
21
reference_url http://www.securityfocus.com/bid/97588
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97588
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1432930
reference_id 1432930
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1432930
23
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857651
reference_id 857651
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857651
24
reference_url https://security.archlinux.org/ASA-201708-9
reference_id ASA-201708-9
reference_type
scores
url https://security.archlinux.org/ASA-201708-9
25
reference_url https://security.archlinux.org/AVG-205
reference_id AVG-205
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-205
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiofile:audiofile:0.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.2.7:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiofile:audiofile:0.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiofile:audiofile:0.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiofile:audiofile:0.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.2:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiofile:audiofile:0.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.3:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiofile:audiofile:0.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiofile:audiofile:0.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.5:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-6831
reference_id CVE-2017-6831
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-6831
37
reference_url https://usn.ubuntu.com/3241-1/
reference_id USN-3241-1
reference_type
scores
url https://usn.ubuntu.com/3241-1/
fixed_packages
0
url pkg:deb/debian/audiofile@0.3.6-4?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-4%3Fdistro=trixie
1
url pkg:deb/debian/audiofile@0.3.6-5?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-5%3Fdistro=trixie
2
url pkg:deb/debian/audiofile@0.3.6-5%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-5%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-5%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/audiofile@0.3.6-7?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-7%3Fdistro=trixie
aliases CVE-2017-6831
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5ckf-qbbb-57f7
3
url VCID-87tp-awyv-4yad
vulnerability_id VCID-87tp-awyv-4yad
summary audiofile: Heap-based buffer overflow in alaw2linear_buf
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6830.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6830.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6830
reference_id
reference_type
scores
0
value 0.04897
scoring_system epss
scoring_elements 0.89594
published_at 2026-04-13T12:55:00Z
1
value 0.06895
scoring_system epss
scoring_elements 0.91337
published_at 2026-04-01T12:55:00Z
2
value 0.06895
scoring_system epss
scoring_elements 0.91378
published_at 2026-04-09T12:55:00Z
3
value 0.06895
scoring_system epss
scoring_elements 0.91384
published_at 2026-04-11T12:55:00Z
4
value 0.06895
scoring_system epss
scoring_elements 0.91387
published_at 2026-04-12T12:55:00Z
5
value 0.06895
scoring_system epss
scoring_elements 0.91341
published_at 2026-04-02T12:55:00Z
6
value 0.06895
scoring_system epss
scoring_elements 0.91351
published_at 2026-04-04T12:55:00Z
7
value 0.06895
scoring_system epss
scoring_elements 0.91359
published_at 2026-04-07T12:55:00Z
8
value 0.06895
scoring_system epss
scoring_elements 0.91371
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6830
2
reference_url https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-alaw2linear_buf-g711-cpp/
reference_id
reference_type
scores
url https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-alaw2linear_buf-g711-cpp/
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839
16
reference_url https://github.com/mpruett/audiofile/issues/34
reference_id
reference_type
scores
url https://github.com/mpruett/audiofile/issues/34
17
reference_url https://github.com/mpruett/audiofile/pull/42
reference_id
reference_type
scores
url https://github.com/mpruett/audiofile/pull/42
18
reference_url http://www.debian.org/security/2017/dsa-3814
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3814
19
reference_url http://www.openwall.com/lists/oss-security/2017/03/13/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/03/13/2
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1432929
reference_id 1432929
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1432929
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857651
reference_id 857651
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857651
22
reference_url https://security.archlinux.org/ASA-201708-9
reference_id ASA-201708-9
reference_type
scores
url https://security.archlinux.org/ASA-201708-9
23
reference_url https://security.archlinux.org/AVG-205
reference_id AVG-205
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-205
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-6830
reference_id CVE-2017-6830
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-6830
26
reference_url https://usn.ubuntu.com/3241-1/
reference_id USN-3241-1
reference_type
scores
url https://usn.ubuntu.com/3241-1/
fixed_packages
0
url pkg:deb/debian/audiofile@0.3.6-4?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-4%3Fdistro=trixie
1
url pkg:deb/debian/audiofile@0.3.6-5?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-5%3Fdistro=trixie
2
url pkg:deb/debian/audiofile@0.3.6-5%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-5%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-5%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/audiofile@0.3.6-7?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-7%3Fdistro=trixie
aliases CVE-2017-6830
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-87tp-awyv-4yad
4
url VCID-913x-rwya-xbgt
vulnerability_id VCID-913x-rwya-xbgt
summary audiofile: Heap-based buffer overflow in Expand3To4Module::run
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6836.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6836.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6836
reference_id
reference_type
scores
0
value 0.04984
scoring_system epss
scoring_elements 0.89652
published_at 2026-04-01T12:55:00Z
1
value 0.04984
scoring_system epss
scoring_elements 0.89694
published_at 2026-04-13T12:55:00Z
2
value 0.04984
scoring_system epss
scoring_elements 0.89695
published_at 2026-04-09T12:55:00Z
3
value 0.04984
scoring_system epss
scoring_elements 0.89702
published_at 2026-04-11T12:55:00Z
4
value 0.04984
scoring_system epss
scoring_elements 0.89701
published_at 2026-04-12T12:55:00Z
5
value 0.04984
scoring_system epss
scoring_elements 0.89655
published_at 2026-04-02T12:55:00Z
6
value 0.04984
scoring_system epss
scoring_elements 0.8967
published_at 2026-04-04T12:55:00Z
7
value 0.04984
scoring_system epss
scoring_elements 0.89672
published_at 2026-04-07T12:55:00Z
8
value 0.04984
scoring_system epss
scoring_elements 0.89689
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6836
2
reference_url https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-expand3to4modulerun-simplemodule-h/
reference_id
reference_type
scores
url https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-expand3to4modulerun-simplemodule-h/
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839
16
reference_url https://github.com/mpruett/audiofile/issues/40
reference_id
reference_type
scores
url https://github.com/mpruett/audiofile/issues/40
17
reference_url https://github.com/mpruett/audiofile/pull/42
reference_id
reference_type
scores
url https://github.com/mpruett/audiofile/pull/42
18
reference_url http://www.debian.org/security/2017/dsa-3814
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3814
19
reference_url http://www.openwall.com/lists/oss-security/2017/03/13/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/03/13/8
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1432937
reference_id 1432937
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1432937
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857651
reference_id 857651
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857651
22
reference_url https://security.archlinux.org/ASA-201708-9
reference_id ASA-201708-9
reference_type
scores
url https://security.archlinux.org/ASA-201708-9
23
reference_url https://security.archlinux.org/AVG-205
reference_id AVG-205
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-205
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-6836
reference_id CVE-2017-6836
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-6836
28
reference_url https://usn.ubuntu.com/3241-1/
reference_id USN-3241-1
reference_type
scores
url https://usn.ubuntu.com/3241-1/
fixed_packages
0
url pkg:deb/debian/audiofile@0.3.6-4?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-4%3Fdistro=trixie
1
url pkg:deb/debian/audiofile@0.3.6-5?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-5%3Fdistro=trixie
2
url pkg:deb/debian/audiofile@0.3.6-5%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-5%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-5%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/audiofile@0.3.6-7?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-7%3Fdistro=trixie
aliases CVE-2017-6836
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-913x-rwya-xbgt
5
url VCID-aeat-dx5y-dfgr
vulnerability_id VCID-aeat-dx5y-dfgr
summary audiofile: Signed integer overflow in sfconvert.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6838.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6838.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6838
reference_id
reference_type
scores
0
value 0.05773
scoring_system epss
scoring_elements 0.90439
published_at 2026-04-01T12:55:00Z
1
value 0.05773
scoring_system epss
scoring_elements 0.9048
published_at 2026-04-13T12:55:00Z
2
value 0.05773
scoring_system epss
scoring_elements 0.90461
published_at 2026-04-07T12:55:00Z
3
value 0.05773
scoring_system epss
scoring_elements 0.90473
published_at 2026-04-08T12:55:00Z
4
value 0.05773
scoring_system epss
scoring_elements 0.90479
published_at 2026-04-09T12:55:00Z
5
value 0.05773
scoring_system epss
scoring_elements 0.90486
published_at 2026-04-12T12:55:00Z
6
value 0.05773
scoring_system epss
scoring_elements 0.90443
published_at 2026-04-02T12:55:00Z
7
value 0.05773
scoring_system epss
scoring_elements 0.90455
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6838
2
reference_url https://blogs.gentoo.org/ago/2017/02/20/audiofile-multiple-ubsan-crashes/
reference_id
reference_type
scores
url https://blogs.gentoo.org/ago/2017/02/20/audiofile-multiple-ubsan-crashes/
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://github.com/antlarr/audiofile/commit/7d65f89defb092b63bcbc5d98349fb222ca73b3c
reference_id
reference_type
scores
url https://github.com/antlarr/audiofile/commit/7d65f89defb092b63bcbc5d98349fb222ca73b3c
18
reference_url https://github.com/mpruett/audiofile/issues/41
reference_id
reference_type
scores
url https://github.com/mpruett/audiofile/issues/41
19
reference_url http://www.debian.org/security/2017/dsa-3814
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3814
20
reference_url http://www.openwall.com/lists/oss-security/2017/03/13/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/03/13/9
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1432943
reference_id 1432943
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1432943
22
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857651
reference_id 857651
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857651
23
reference_url https://security.archlinux.org/ASA-201708-9
reference_id ASA-201708-9
reference_type
scores
url https://security.archlinux.org/ASA-201708-9
24
reference_url https://security.archlinux.org/AVG-205
reference_id AVG-205
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-205
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-6838
reference_id CVE-2017-6838
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-6838
27
reference_url https://usn.ubuntu.com/3241-1/
reference_id USN-3241-1
reference_type
scores
url https://usn.ubuntu.com/3241-1/
fixed_packages
0
url pkg:deb/debian/audiofile@0.3.6-4?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-4%3Fdistro=trixie
1
url pkg:deb/debian/audiofile@0.3.6-5?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-5%3Fdistro=trixie
2
url pkg:deb/debian/audiofile@0.3.6-5%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-5%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-5%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/audiofile@0.3.6-7?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-7%3Fdistro=trixie
aliases CVE-2017-6838
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aeat-dx5y-dfgr
6
url VCID-gg9m-4dyw-3ub1
vulnerability_id VCID-gg9m-4dyw-3ub1
summary audiofile: Divide-by-zero in BlockCodec::runPull
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6833.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6833.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6833
reference_id
reference_type
scores
0
value 0.05773
scoring_system epss
scoring_elements 0.90439
published_at 2026-04-01T12:55:00Z
1
value 0.05773
scoring_system epss
scoring_elements 0.9048
published_at 2026-04-13T12:55:00Z
2
value 0.05773
scoring_system epss
scoring_elements 0.90473
published_at 2026-04-08T12:55:00Z
3
value 0.05773
scoring_system epss
scoring_elements 0.90479
published_at 2026-04-09T12:55:00Z
4
value 0.05773
scoring_system epss
scoring_elements 0.90486
published_at 2026-04-12T12:55:00Z
5
value 0.05773
scoring_system epss
scoring_elements 0.90443
published_at 2026-04-02T12:55:00Z
6
value 0.05773
scoring_system epss
scoring_elements 0.90455
published_at 2026-04-04T12:55:00Z
7
value 0.05773
scoring_system epss
scoring_elements 0.90461
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6833
2
reference_url https://blogs.gentoo.org/ago/2017/02/20/audiofile-divide-by-zero-in-blockcodecrunpull-blockcodec-cpp/
reference_id
reference_type
scores
url https://blogs.gentoo.org/ago/2017/02/20/audiofile-divide-by-zero-in-blockcodecrunpull-blockcodec-cpp/
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839
16
reference_url https://github.com/mpruett/audiofile/issues/37
reference_id
reference_type
scores
url https://github.com/mpruett/audiofile/issues/37
17
reference_url https://github.com/mpruett/audiofile/pull/42
reference_id
reference_type
scores
url https://github.com/mpruett/audiofile/pull/42
18
reference_url http://www.debian.org/security/2017/dsa-3814
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3814
19
reference_url http://www.openwall.com/lists/oss-security/2017/03/13/5
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/03/13/5
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1432933
reference_id 1432933
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1432933
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857651
reference_id 857651
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857651
22
reference_url https://security.archlinux.org/ASA-201708-9
reference_id ASA-201708-9
reference_type
scores
url https://security.archlinux.org/ASA-201708-9
23
reference_url https://security.archlinux.org/AVG-205
reference_id AVG-205
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-205
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-6833
reference_id CVE-2017-6833
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-6833
26
reference_url https://usn.ubuntu.com/3241-1/
reference_id USN-3241-1
reference_type
scores
url https://usn.ubuntu.com/3241-1/
fixed_packages
0
url pkg:deb/debian/audiofile@0.3.6-4?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-4%3Fdistro=trixie
1
url pkg:deb/debian/audiofile@0.3.6-5?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-5%3Fdistro=trixie
2
url pkg:deb/debian/audiofile@0.3.6-5%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-5%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-5%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/audiofile@0.3.6-7?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-7%3Fdistro=trixie
aliases CVE-2017-6833
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gg9m-4dyw-3ub1
7
url VCID-j162-684h-wqak
vulnerability_id VCID-j162-684h-wqak
summary audiofile: Divide-by-zero in BlockCodec::reset1
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6835.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6835.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6835
reference_id
reference_type
scores
0
value 0.04451
scoring_system epss
scoring_elements 0.89011
published_at 2026-04-01T12:55:00Z
1
value 0.04451
scoring_system epss
scoring_elements 0.89065
published_at 2026-04-13T12:55:00Z
2
value 0.04451
scoring_system epss
scoring_elements 0.89059
published_at 2026-04-09T12:55:00Z
3
value 0.04451
scoring_system epss
scoring_elements 0.89071
published_at 2026-04-11T12:55:00Z
4
value 0.04451
scoring_system epss
scoring_elements 0.89067
published_at 2026-04-12T12:55:00Z
5
value 0.04451
scoring_system epss
scoring_elements 0.89019
published_at 2026-04-02T12:55:00Z
6
value 0.04451
scoring_system epss
scoring_elements 0.89035
published_at 2026-04-04T12:55:00Z
7
value 0.04451
scoring_system epss
scoring_elements 0.89037
published_at 2026-04-07T12:55:00Z
8
value 0.04451
scoring_system epss
scoring_elements 0.89054
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6835
2
reference_url https://blogs.gentoo.org/ago/2017/02/20/audiofile-divide-by-zero-in-blockcodecreset1-blockcodec-cpp/
reference_id
reference_type
scores
url https://blogs.gentoo.org/ago/2017/02/20/audiofile-divide-by-zero-in-blockcodecreset1-blockcodec-cpp/
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839
16
reference_url https://github.com/mpruett/audiofile/issues/39
reference_id
reference_type
scores
url https://github.com/mpruett/audiofile/issues/39
17
reference_url https://github.com/mpruett/audiofile/pull/42
reference_id
reference_type
scores
url https://github.com/mpruett/audiofile/pull/42
18
reference_url http://www.debian.org/security/2017/dsa-3814
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3814
19
reference_url http://www.openwall.com/lists/oss-security/2017/03/13/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/03/13/7
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1432939
reference_id 1432939
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1432939
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857651
reference_id 857651
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857651
22
reference_url https://security.archlinux.org/ASA-201708-9
reference_id ASA-201708-9
reference_type
scores
url https://security.archlinux.org/ASA-201708-9
23
reference_url https://security.archlinux.org/AVG-205
reference_id AVG-205
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-205
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-6835
reference_id CVE-2017-6835
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-6835
26
reference_url https://usn.ubuntu.com/3241-1/
reference_id USN-3241-1
reference_type
scores
url https://usn.ubuntu.com/3241-1/
fixed_packages
0
url pkg:deb/debian/audiofile@0.3.6-4?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-4%3Fdistro=trixie
1
url pkg:deb/debian/audiofile@0.3.6-5?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-5%3Fdistro=trixie
2
url pkg:deb/debian/audiofile@0.3.6-5%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-5%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-5%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/audiofile@0.3.6-7?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-7%3Fdistro=trixie
aliases CVE-2017-6835
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j162-684h-wqak
8
url VCID-nmab-8ky6-nyb4
vulnerability_id VCID-nmab-8ky6-nyb4
summary audiofile: Heap-based buffer overflow in MSADPCM::initializeCoefficients
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6827.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6827.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6827
reference_id
reference_type
scores
0
value 0.33778
scoring_system epss
scoring_elements 0.9692
published_at 2026-04-01T12:55:00Z
1
value 0.33778
scoring_system epss
scoring_elements 0.96928
published_at 2026-04-02T12:55:00Z
2
value 0.33778
scoring_system epss
scoring_elements 0.96932
published_at 2026-04-04T12:55:00Z
3
value 0.33778
scoring_system epss
scoring_elements 0.96936
published_at 2026-04-07T12:55:00Z
4
value 0.33778
scoring_system epss
scoring_elements 0.96944
published_at 2026-04-08T12:55:00Z
5
value 0.33778
scoring_system epss
scoring_elements 0.96946
published_at 2026-04-09T12:55:00Z
6
value 0.33778
scoring_system epss
scoring_elements 0.96949
published_at 2026-04-11T12:55:00Z
7
value 0.33778
scoring_system epss
scoring_elements 0.9695
published_at 2026-04-12T12:55:00Z
8
value 0.33778
scoring_system epss
scoring_elements 0.96951
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6827
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1432924
reference_id 1432924
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1432924
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857651
reference_id 857651
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857651
17
reference_url https://security.archlinux.org/ASA-201708-9
reference_id ASA-201708-9
reference_type
scores
url https://security.archlinux.org/ASA-201708-9
18
reference_url https://security.archlinux.org/AVG-205
reference_id AVG-205
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-205
19
reference_url https://usn.ubuntu.com/3241-1/
reference_id USN-3241-1
reference_type
scores
url https://usn.ubuntu.com/3241-1/
fixed_packages
0
url pkg:deb/debian/audiofile@0.3.6-4?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-4%3Fdistro=trixie
1
url pkg:deb/debian/audiofile@0.3.6-5?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-5%3Fdistro=trixie
2
url pkg:deb/debian/audiofile@0.3.6-5%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-5%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-5%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/audiofile@0.3.6-7?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-7%3Fdistro=trixie
aliases CVE-2017-6827
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nmab-8ky6-nyb4
9
url VCID-qw16-rfw7-2qdk
vulnerability_id VCID-qw16-rfw7-2qdk
summary audiofile: Signed integer overflow in MSADPCM.cpp
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6839.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6839.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6839
reference_id
reference_type
scores
0
value 0.04451
scoring_system epss
scoring_elements 0.89011
published_at 2026-04-01T12:55:00Z
1
value 0.04451
scoring_system epss
scoring_elements 0.89035
published_at 2026-04-04T12:55:00Z
2
value 0.04451
scoring_system epss
scoring_elements 0.89037
published_at 2026-04-07T12:55:00Z
3
value 0.04451
scoring_system epss
scoring_elements 0.89054
published_at 2026-04-08T12:55:00Z
4
value 0.04451
scoring_system epss
scoring_elements 0.89059
published_at 2026-04-09T12:55:00Z
5
value 0.04451
scoring_system epss
scoring_elements 0.89071
published_at 2026-04-11T12:55:00Z
6
value 0.04451
scoring_system epss
scoring_elements 0.89067
published_at 2026-04-12T12:55:00Z
7
value 0.04451
scoring_system epss
scoring_elements 0.89019
published_at 2026-04-02T12:55:00Z
8
value 0.05773
scoring_system epss
scoring_elements 0.9048
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6839
2
reference_url https://blogs.gentoo.org/ago/2017/02/20/audiofile-multiple-ubsan-crashes/
reference_id
reference_type
scores
url https://blogs.gentoo.org/ago/2017/02/20/audiofile-multiple-ubsan-crashes/
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://github.com/antlarr/audiofile/commit/beacc44eb8cdf6d58717ec1a5103c5141f1b37f9
reference_id
reference_type
scores
url https://github.com/antlarr/audiofile/commit/beacc44eb8cdf6d58717ec1a5103c5141f1b37f9
18
reference_url https://github.com/mpruett/audiofile/issues/41
reference_id
reference_type
scores
url https://github.com/mpruett/audiofile/issues/41
19
reference_url http://www.debian.org/security/2017/dsa-3814
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3814
20
reference_url http://www.openwall.com/lists/oss-security/2017/03/13/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/03/13/9
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1432944
reference_id 1432944
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1432944
22
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857651
reference_id 857651
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857651
23
reference_url https://security.archlinux.org/ASA-201708-9
reference_id ASA-201708-9
reference_type
scores
url https://security.archlinux.org/ASA-201708-9
24
reference_url https://security.archlinux.org/AVG-205
reference_id AVG-205
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-205
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-6839
reference_id CVE-2017-6839
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-6839
27
reference_url https://usn.ubuntu.com/3241-1/
reference_id USN-3241-1
reference_type
scores
url https://usn.ubuntu.com/3241-1/
fixed_packages
0
url pkg:deb/debian/audiofile@0.3.6-4?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-4%3Fdistro=trixie
1
url pkg:deb/debian/audiofile@0.3.6-5?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-5%3Fdistro=trixie
2
url pkg:deb/debian/audiofile@0.3.6-5%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-5%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-5%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/audiofile@0.3.6-7?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-7%3Fdistro=trixie
aliases CVE-2017-6839
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qw16-rfw7-2qdk
10
url VCID-sekd-w6gm-67dv
vulnerability_id VCID-sekd-w6gm-67dv
summary audiofile: Heap-based buffer overflow in ulaw2linear_buf
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6834.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6834.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6834
reference_id
reference_type
scores
0
value 0.04313
scoring_system epss
scoring_elements 0.88897
published_at 2026-04-13T12:55:00Z
1
value 0.06895
scoring_system epss
scoring_elements 0.91337
published_at 2026-04-01T12:55:00Z
2
value 0.06895
scoring_system epss
scoring_elements 0.91371
published_at 2026-04-08T12:55:00Z
3
value 0.06895
scoring_system epss
scoring_elements 0.91378
published_at 2026-04-09T12:55:00Z
4
value 0.06895
scoring_system epss
scoring_elements 0.91384
published_at 2026-04-11T12:55:00Z
5
value 0.06895
scoring_system epss
scoring_elements 0.91387
published_at 2026-04-12T12:55:00Z
6
value 0.06895
scoring_system epss
scoring_elements 0.91341
published_at 2026-04-02T12:55:00Z
7
value 0.06895
scoring_system epss
scoring_elements 0.91351
published_at 2026-04-04T12:55:00Z
8
value 0.06895
scoring_system epss
scoring_elements 0.91359
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6834
2
reference_url https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-ulaw2linear_buf-g711-cpp/
reference_id
reference_type
scores
url https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-ulaw2linear_buf-g711-cpp/
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839
16
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
17
reference_url https://github.com/mpruett/audiofile/issues/38
reference_id
reference_type
scores
url https://github.com/mpruett/audiofile/issues/38
18
reference_url https://github.com/mpruett/audiofile/pull/42
reference_id
reference_type
scores
url https://github.com/mpruett/audiofile/pull/42
19
reference_url http://www.debian.org/security/2017/dsa-3814
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3814
20
reference_url http://www.openwall.com/lists/oss-security/2017/03/13/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/03/13/6
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1432935
reference_id 1432935
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1432935
22
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857651
reference_id 857651
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857651
23
reference_url https://security.archlinux.org/ASA-201708-9
reference_id ASA-201708-9
reference_type
scores
url https://security.archlinux.org/ASA-201708-9
24
reference_url https://security.archlinux.org/AVG-205
reference_id AVG-205
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-205
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiofile:audiofile:0.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.2.7:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiofile:audiofile:0.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiofile:audiofile:0.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.1:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiofile:audiofile:0.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.2:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiofile:audiofile:0.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.3:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiofile:audiofile:0.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.4:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiofile:audiofile:0.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.5:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-6834
reference_id CVE-2017-6834
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-6834
36
reference_url https://usn.ubuntu.com/3241-1/
reference_id USN-3241-1
reference_type
scores
url https://usn.ubuntu.com/3241-1/
fixed_packages
0
url pkg:deb/debian/audiofile@0.3.6-4?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-4%3Fdistro=trixie
1
url pkg:deb/debian/audiofile@0.3.6-5?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-5%3Fdistro=trixie
2
url pkg:deb/debian/audiofile@0.3.6-5%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-5%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-5%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/audiofile@0.3.6-7?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-7%3Fdistro=trixie
aliases CVE-2017-6834
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sekd-w6gm-67dv
11
url VCID-sfj3-8vbt-bkfp
vulnerability_id VCID-sfj3-8vbt-bkfp
summary audiofile: Global buffer overflow in decodeSample
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6829.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6829.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6829
reference_id
reference_type
scores
0
value 0.04576
scoring_system epss
scoring_elements 0.89166
published_at 2026-04-01T12:55:00Z
1
value 0.04576
scoring_system epss
scoring_elements 0.89216
published_at 2026-04-13T12:55:00Z
2
value 0.04576
scoring_system epss
scoring_elements 0.89212
published_at 2026-04-09T12:55:00Z
3
value 0.04576
scoring_system epss
scoring_elements 0.89222
published_at 2026-04-11T12:55:00Z
4
value 0.04576
scoring_system epss
scoring_elements 0.89218
published_at 2026-04-12T12:55:00Z
5
value 0.04576
scoring_system epss
scoring_elements 0.89173
published_at 2026-04-02T12:55:00Z
6
value 0.04576
scoring_system epss
scoring_elements 0.89187
published_at 2026-04-04T12:55:00Z
7
value 0.04576
scoring_system epss
scoring_elements 0.89189
published_at 2026-04-07T12:55:00Z
8
value 0.04576
scoring_system epss
scoring_elements 0.89208
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6829
2
reference_url https://blogs.gentoo.org/ago/2017/02/20/audiofile-global-buffer-overflow-in-decodesample-ima-cpp/
reference_id
reference_type
scores
url https://blogs.gentoo.org/ago/2017/02/20/audiofile-global-buffer-overflow-in-decodesample-ima-cpp/
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839
16
reference_url https://github.com/antlarr/audiofile/commit/25eb00ce913452c2e614548d7df93070bf0d066f
reference_id
reference_type
scores
url https://github.com/antlarr/audiofile/commit/25eb00ce913452c2e614548d7df93070bf0d066f
17
reference_url https://github.com/mpruett/audiofile/issues/33
reference_id
reference_type
scores
url https://github.com/mpruett/audiofile/issues/33
18
reference_url http://www.debian.org/security/2017/dsa-3814
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3814
19
reference_url http://www.openwall.com/lists/oss-security/2017/03/13/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/03/13/1
20
reference_url http://www.securityfocus.com/bid/97189
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97189
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1432928
reference_id 1432928
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1432928
22
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857651
reference_id 857651
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857651
23
reference_url https://security.archlinux.org/ASA-201708-9
reference_id ASA-201708-9
reference_type
scores
url https://security.archlinux.org/ASA-201708-9
24
reference_url https://security.archlinux.org/AVG-205
reference_id AVG-205
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-205
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-6829
reference_id CVE-2017-6829
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-6829
27
reference_url https://usn.ubuntu.com/3241-1/
reference_id USN-3241-1
reference_type
scores
url https://usn.ubuntu.com/3241-1/
fixed_packages
0
url pkg:deb/debian/audiofile@0.3.6-4?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-4%3Fdistro=trixie
1
url pkg:deb/debian/audiofile@0.3.6-5?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-5%3Fdistro=trixie
2
url pkg:deb/debian/audiofile@0.3.6-5%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-5%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-5%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/audiofile@0.3.6-7?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-7%3Fdistro=trixie
aliases CVE-2017-6829
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sfj3-8vbt-bkfp
12
url VCID-ur9b-fgja-r7he
vulnerability_id VCID-ur9b-fgja-r7he
summary audiofile: Heap-based buffer overflow in MSADPCM::decodeBlock
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6832.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6832.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6832
reference_id
reference_type
scores
0
value 0.04517
scoring_system epss
scoring_elements 0.891
published_at 2026-04-01T12:55:00Z
1
value 0.04517
scoring_system epss
scoring_elements 0.89153
published_at 2026-04-13T12:55:00Z
2
value 0.04517
scoring_system epss
scoring_elements 0.89149
published_at 2026-04-09T12:55:00Z
3
value 0.04517
scoring_system epss
scoring_elements 0.8916
published_at 2026-04-11T12:55:00Z
4
value 0.04517
scoring_system epss
scoring_elements 0.89156
published_at 2026-04-12T12:55:00Z
5
value 0.04517
scoring_system epss
scoring_elements 0.89109
published_at 2026-04-02T12:55:00Z
6
value 0.04517
scoring_system epss
scoring_elements 0.89123
published_at 2026-04-04T12:55:00Z
7
value 0.04517
scoring_system epss
scoring_elements 0.89126
published_at 2026-04-07T12:55:00Z
8
value 0.04517
scoring_system epss
scoring_elements 0.89144
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6832
2
reference_url https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-msadpcmdecodeblock-msadpcm-cpp/
reference_id
reference_type
scores
url https://blogs.gentoo.org/ago/2017/02/20/audiofile-heap-based-buffer-overflow-in-msadpcmdecodeblock-msadpcm-cpp/
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6827
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6828
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6829
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6830
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6831
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6832
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6833
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6834
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6835
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6836
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6837
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6838
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6839
16
reference_url https://github.com/mpruett/audiofile/issues/36
reference_id
reference_type
scores
url https://github.com/mpruett/audiofile/issues/36
17
reference_url https://github.com/mpruett/audiofile/pull/42
reference_id
reference_type
scores
url https://github.com/mpruett/audiofile/pull/42
18
reference_url http://www.debian.org/security/2017/dsa-3814
reference_id
reference_type
scores
url http://www.debian.org/security/2017/dsa-3814
19
reference_url http://www.openwall.com/lists/oss-security/2017/03/13/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/03/13/4
20
reference_url http://www.securityfocus.com/bid/97589
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97589
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1432932
reference_id 1432932
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1432932
22
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857651
reference_id 857651
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=857651
23
reference_url https://security.archlinux.org/ASA-201708-9
reference_id ASA-201708-9
reference_type
scores
url https://security.archlinux.org/ASA-201708-9
24
reference_url https://security.archlinux.org/AVG-205
reference_id AVG-205
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-205
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:audiofile:audiofile:0.3.6:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-6832
reference_id CVE-2017-6832
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-6832
29
reference_url https://usn.ubuntu.com/3241-1/
reference_id USN-3241-1
reference_type
scores
url https://usn.ubuntu.com/3241-1/
fixed_packages
0
url pkg:deb/debian/audiofile@0.3.6-4?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-4%3Fdistro=trixie
1
url pkg:deb/debian/audiofile@0.3.6-5?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-5%3Fdistro=trixie
2
url pkg:deb/debian/audiofile@0.3.6-5%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-5%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-5%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/audiofile@0.3.6-7?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-7%3Fdistro=trixie
aliases CVE-2017-6832
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ur9b-fgja-r7he
13
url VCID-vcr2-823b-93d6
vulnerability_id VCID-vcr2-823b-93d6
summary audiofile: a Denial of Service via crafted file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-18781.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-18781.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-18781
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08134
published_at 2026-04-01T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08194
published_at 2026-04-07T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08231
published_at 2026-04-13T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08268
published_at 2026-04-11T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08249
published_at 2026-04-12T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08246
published_at 2026-04-04T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08258
published_at 2026-04-08T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08278
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-18781
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18781
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-18781
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2235372
reference_id 2235372
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2235372
5
reference_url https://github.com/mpruett/audiofile/issues/56
reference_id 56
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-04T16:33:41Z/
url https://github.com/mpruett/audiofile/issues/56
fixed_packages
0
url pkg:deb/debian/audiofile@0.3.6-4?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-4%3Fdistro=trixie
1
url pkg:deb/debian/audiofile@0.3.6-5?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-5%3Fdistro=trixie
2
url pkg:deb/debian/audiofile@0.3.6-5%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-5%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-5%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/audiofile@0.3.6-7?distro=trixie
purl pkg:deb/debian/audiofile@0.3.6-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-7%3Fdistro=trixie
aliases CVE-2020-18781
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vcr2-823b-93d6
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/audiofile@0.3.6-4%3Fdistro=trixie