Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/583399?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/583399?format=api", "purl": "pkg:deb/debian/collectd@5.12.0-14?distro=trixie", "type": "deb", "namespace": "debian", "name": "collectd", "version": "5.12.0-14", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "5.12.0-26", "latest_non_vulnerable_version": "5.12.0-27", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59889?format=api", "vulnerability_id": "VCID-256b-g13b-f3e3", "summary": "Gentoo's collectd package contains multiple vulnerabilities, the\n worst of which may allow local attackers to escalate privileges.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16820.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16820.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16820", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02833", "scoring_system": "epss", "scoring_elements": "0.86117", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02833", "scoring_system": "epss", "scoring_elements": "0.86143", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02833", "scoring_system": "epss", "scoring_elements": "0.86127", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03423", "scoring_system": "epss", "scoring_elements": "0.87456", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03423", "scoring_system": "epss", "scoring_elements": "0.87468", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03423", "scoring_system": "epss", "scoring_elements": "0.87463", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03423", "scoring_system": "epss", "scoring_elements": "0.8745", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03423", "scoring_system": "epss", "scoring_elements": "0.8746", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16820" }, { "reference_url": "https://bugs.debian.org/881757", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/881757" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16820", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16820" }, { "reference_url": "https://github.com/collectd/collectd/commit/d16c24542b2f96a194d43a73c2e5778822b9cb47", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/collectd/collectd/commit/d16c24542b2f96a194d43a73c2e5778822b9cb47" }, { "reference_url": "https://github.com/collectd/collectd/issues/2291", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/collectd/collectd/issues/2291" }, { "reference_url": "https://github.com/collectd/collectd/releases/tag/collectd-5.6.3", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/collectd/collectd/releases/tag/collectd-5.6.3" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1516447", "reference_id": "1516447", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1516447" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881757", "reference_id": "881757", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881757" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16820", "reference_id": "CVE-2017-16820", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16820" }, { "reference_url": "https://security.gentoo.org/glsa/201803-10", "reference_id": "GLSA-201803-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201803-10" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0252", "reference_id": "RHSA-2018:0252", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0252" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0299", "reference_id": "RHSA-2018:0299", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0299" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0560", "reference_id": "RHSA-2018:0560", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0560" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1605", "reference_id": "RHSA-2018:1605", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1605" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2615", "reference_id": "RHSA-2018:2615", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2615" }, { "reference_url": "https://usn.ubuntu.com/USN-4793-1/", "reference_id": "USN-USN-4793-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4793-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/586283?format=api", "purl": "pkg:deb/debian/collectd@5.8.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@5.8.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583398?format=api", "purl": "pkg:deb/debian/collectd@5.12.0-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@5.12.0-7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583399?format=api", "purl": "pkg:deb/debian/collectd@5.12.0-14?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@5.12.0-14%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583400?format=api", "purl": "pkg:deb/debian/collectd@5.12.0-26?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@5.12.0-26%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583401?format=api", "purl": "pkg:deb/debian/collectd@5.12.0-27?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@5.12.0-27%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-16820" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-256b-g13b-f3e3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82130?format=api", "vulnerability_id": "VCID-h35j-uhpg-7fde", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6254.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6254.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6254", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.13065", "scoring_system": "epss", "scoring_elements": "0.94057", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.13065", "scoring_system": "epss", "scoring_elements": "0.94067", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.13065", "scoring_system": "epss", "scoring_elements": "0.94077", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.13065", "scoring_system": "epss", "scoring_elements": "0.9408", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.13065", "scoring_system": "epss", "scoring_elements": "0.94088", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.13065", "scoring_system": "epss", "scoring_elements": "0.94093", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.13065", "scoring_system": "epss", "scoring_elements": "0.94097", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.13065", "scoring_system": "epss", "scoring_elements": "0.94098", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6254" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6254", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6254" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1360709", "reference_id": "1360709", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1360709" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832507", "reference_id": "832507", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832507" }, { "reference_url": "https://usn.ubuntu.com/USN-4793-1/", "reference_id": "USN-USN-4793-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4793-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/585430?format=api", "purl": "pkg:deb/debian/collectd@5.5.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@5.5.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583398?format=api", "purl": "pkg:deb/debian/collectd@5.12.0-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@5.12.0-7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583399?format=api", "purl": "pkg:deb/debian/collectd@5.12.0-14?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@5.12.0-14%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583400?format=api", "purl": "pkg:deb/debian/collectd@5.12.0-26?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@5.12.0-26%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583401?format=api", "purl": "pkg:deb/debian/collectd@5.12.0-27?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@5.12.0-27%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-6254" ], "risk_score": 3.9, "exploitability": "0.5", "weighted_severity": "7.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h35j-uhpg-7fde" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84581?format=api", "vulnerability_id": "VCID-pae6-5qcr-vfc2", "summary": "collectd: Infinite loop due to incorrect interaction of parse_packet() and parse_part_sign_sha256() functions", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7401.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7401.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7401", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00982", "scoring_system": "epss", "scoring_elements": "0.76719", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00982", "scoring_system": "epss", "scoring_elements": "0.76777", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00982", "scoring_system": "epss", "scoring_elements": "0.76776", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00982", "scoring_system": "epss", "scoring_elements": "0.76804", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00982", "scoring_system": "epss", "scoring_elements": "0.76785", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00982", "scoring_system": "epss", "scoring_elements": "0.76723", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00982", "scoring_system": "epss", "scoring_elements": "0.76752", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00982", "scoring_system": "epss", "scoring_elements": "0.76734", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00982", "scoring_system": "epss", "scoring_elements": "0.76765", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7401" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7401", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7401" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/collectd/collectd/issues/2174", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/collectd/collectd/issues/2174" }, { "reference_url": "http://www.securityfocus.com/bid/97321", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/97321" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1439674", "reference_id": "1439674", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1439674" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859494", "reference_id": "859494", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=859494" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7401", "reference_id": "CVE-2017-7401", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7401" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1285", "reference_id": "RHSA-2017:1285", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1285" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1787", "reference_id": "RHSA-2017:1787", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1787" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2615", "reference_id": "RHSA-2018:2615", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2615" }, { "reference_url": "https://usn.ubuntu.com/USN-4793-1/", "reference_id": "USN-USN-4793-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-4793-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/586698?format=api", "purl": "pkg:deb/debian/collectd@5.7.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@5.7.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583398?format=api", "purl": "pkg:deb/debian/collectd@5.12.0-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@5.12.0-7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583399?format=api", "purl": "pkg:deb/debian/collectd@5.12.0-14?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@5.12.0-14%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583400?format=api", "purl": "pkg:deb/debian/collectd@5.12.0-26?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@5.12.0-26%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583401?format=api", "purl": "pkg:deb/debian/collectd@5.12.0-27?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@5.12.0-27%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-7401" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pae6-5qcr-vfc2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92085?format=api", "vulnerability_id": "VCID-ppgg-vagu-j7gz", "summary": "The cu_rrd_create_file function (src/utils_rrdcreate.c) in collectd 4.x before 4.9.4 and before 4.10.2 allow remote attackers to cause a denial of service (assertion failure) via a packet with a timestamp whose value is 10 or less, as demonstrated by creating RRD files using the (1) RRDtool and (2) RRDCacheD plugins.", "references": [ { "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605092", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605092" }, { "reference_url": "http://collectd.org/news.shtml#news86", "reference_id": "", "reference_type": "", "scores": [], "url": "http://collectd.org/news.shtml#news86" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052875.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052875.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00005.html" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4336", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01657", "scoring_system": "epss", "scoring_elements": "0.82051", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01657", "scoring_system": "epss", "scoring_elements": "0.81985", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01657", "scoring_system": "epss", "scoring_elements": "0.81996", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01657", "scoring_system": "epss", "scoring_elements": "0.82019", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01657", "scoring_system": "epss", "scoring_elements": "0.82015", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01657", "scoring_system": "epss", "scoring_elements": "0.82042", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01657", "scoring_system": "epss", "scoring_elements": "0.82049", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01657", "scoring_system": "epss", "scoring_elements": "0.82069", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01657", "scoring_system": "epss", "scoring_elements": "0.82059", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-4336" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4336", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4336" }, { "reference_url": "http://secunia.com/advisories/42393", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42393" }, { "reference_url": "http://secunia.com/advisories/42491", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42491" }, { "reference_url": "http://secunia.com/advisories/42846", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42846" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2133", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2133" }, { "reference_url": "http://www.securityfocus.com/bid/45075", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/45075" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3196", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3196" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/0041", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/0041" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605092", "reference_id": "605092", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605092" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.7.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.7.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.7.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.8.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.8.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.8.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.9.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:collectd:collectd:4.9.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:collectd:collectd:4.9.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4336", "reference_id": "CVE-2010-4336", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4336" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583547?format=api", "purl": "pkg:deb/debian/collectd@4.10.1-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@4.10.1-2.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583398?format=api", "purl": "pkg:deb/debian/collectd@5.12.0-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@5.12.0-7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583399?format=api", "purl": "pkg:deb/debian/collectd@5.12.0-14?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@5.12.0-14%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583400?format=api", "purl": "pkg:deb/debian/collectd@5.12.0-26?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@5.12.0-26%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583401?format=api", "purl": "pkg:deb/debian/collectd@5.12.0-27?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@5.12.0-27%3Fdistro=trixie" } ], "aliases": [ "CVE-2010-4336" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ppgg-vagu-j7gz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59890?format=api", "vulnerability_id": "VCID-se54-ewc3-sub8", "summary": "Gentoo's collectd package contains multiple vulnerabilities, the\n worst of which may allow local attackers to escalate privileges.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18240", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12233", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12349", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12395", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12195", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12275", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12325", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12332", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12296", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12258", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18240" }, { "reference_url": "https://security.gentoo.org/glsa/201803-10", "reference_id": "GLSA-201803-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201803-10" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583397?format=api", "purl": "pkg:deb/debian/collectd@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583398?format=api", "purl": "pkg:deb/debian/collectd@5.12.0-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@5.12.0-7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583399?format=api", "purl": "pkg:deb/debian/collectd@5.12.0-14?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@5.12.0-14%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583400?format=api", "purl": "pkg:deb/debian/collectd@5.12.0-26?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@5.12.0-26%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583401?format=api", "purl": "pkg:deb/debian/collectd@5.12.0-27?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@5.12.0-27%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-18240" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-se54-ewc3-sub8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34258?format=api", "vulnerability_id": "VCID-xzye-g5rw-fyh5", "summary": "Multiple vulnerabilities have been found in GraphicsMagick,\n allowing remote attackers to execute arbitrary code or cause a Denial of\n Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3736.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3736.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3736", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26117", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26198", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.2624", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26012", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26078", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.2613", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26139", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31157", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31113", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3736" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=537941", "reference_id": "537941", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537941" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559797", "reference_id": "559797", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559797" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559801", "reference_id": "559801", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559801" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559806", "reference_id": "559806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559809", "reference_id": "559809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559809" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559811", "reference_id": "559811", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559811" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559814", "reference_id": "559814", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559814" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559815", "reference_id": "559815", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559815" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559816", "reference_id": "559816", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559816" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559819", "reference_id": "559819", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559819" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559822", "reference_id": "559822", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559822" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559824", "reference_id": "559824", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559824" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559825", "reference_id": "559825", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559825" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559826", "reference_id": "559826", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559826" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559829", "reference_id": "559829", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559829" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559831", "reference_id": "559831", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559831" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559832", "reference_id": "559832", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559832" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559833", "reference_id": "559833", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559833" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559834", "reference_id": "559834", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559834" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559835", "reference_id": "559835", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559835" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559836", "reference_id": "559836", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559836" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559837", "reference_id": "559837", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559837" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559840", "reference_id": "559840", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559840" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559844", "reference_id": "559844", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559844" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559845", "reference_id": "559845", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559845" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702436", "reference_id": "702436", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702436" }, { "reference_url": "https://security.gentoo.org/glsa/201311-10", "reference_id": "GLSA-201311-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201311-10" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1646", "reference_id": "RHSA-2009:1646", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1646" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0039", "reference_id": "RHSA-2010:0039", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0039" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/586064?format=api", "purl": "pkg:deb/debian/collectd@4.8.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@4.8.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583398?format=api", "purl": "pkg:deb/debian/collectd@5.12.0-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@5.12.0-7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583399?format=api", "purl": "pkg:deb/debian/collectd@5.12.0-14?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@5.12.0-14%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583400?format=api", "purl": "pkg:deb/debian/collectd@5.12.0-26?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@5.12.0-26%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583401?format=api", "purl": "pkg:deb/debian/collectd@5.12.0-27?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@5.12.0-27%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-3736" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xzye-g5rw-fyh5" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/collectd@5.12.0-14%3Fdistro=trixie" }