Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/583613?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/583613?format=api", "purl": "pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie", "type": "deb", "namespace": "debian", "name": "cpio", "version": "2.15+dfsg-2.1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89139?format=api", "vulnerability_id": "VCID-156j-33gz-xkdf", "summary": "security flaw", "references": [ { "reference_url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:03.cpio.asc", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:03.cpio.asc" }, { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.2/SCOSA-2006.2.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.2/SCOSA-2006.2.txt" }, { "reference_url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.32/SCOSA-2005.32.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.32/SCOSA-2005.32.txt" }, { "reference_url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html" }, { "reference_url": "http://marc.info/?l=bugtraq&m=111342664116120&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=111342664116120&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1111.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1111.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-1111", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25823", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25731", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25748", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26036", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.2612", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.2616", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25929", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25997", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26048", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26057", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26012", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25953", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25957", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25938", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25909", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25844", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25838", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25791", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25681", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25746", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.25806", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-1111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1111", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1111" }, { "reference_url": "http://secunia.com/advisories/16998", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/16998" }, { "reference_url": "http://secunia.com/advisories/17123", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17123" }, { "reference_url": "http://secunia.com/advisories/17532", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17532" }, { "reference_url": "http://secunia.com/advisories/18290", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18290" }, { "reference_url": "http://secunia.com/advisories/18395", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18395" }, { "reference_url": "http://secunia.com/advisories/20117", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/20117" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A358", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A358" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9783", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9783" }, { "reference_url": "http://www.debian.org/security/2005/dsa-846", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-846" }, { "reference_url": "http://www.osvdb.org/15725", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.osvdb.org/15725" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-378.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-378.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-806.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-806.html" }, { "reference_url": "http://www.securityfocus.com/bid/13159", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/13159" }, { "reference_url": "http://www.ubuntu.com/usn/usn-189-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-189-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617604", "reference_id": "1617604", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617604" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305372", "reference_id": "305372", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305372" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:cpio:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:cpio:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:cpio:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1111", "reference_id": "CVE-2005-1111", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1111" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:378", "reference_id": "RHSA-2005:378", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:378" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:806", "reference_id": "RHSA-2005:806", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:806" }, { "reference_url": "https://usn.ubuntu.com/189-1/", "reference_id": "USN-189-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/189-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/585690?format=api", "purl": "pkg:deb/debian/cpio@2.6-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.6-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583610?format=api", "purl": "pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cguy-5d2j-6yed" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583611?format=api", "purl": "pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cguy-5d2j-6yed" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583612?format=api", "purl": "pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583613?format=api", "purl": "pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2005-1111" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-156j-33gz-xkdf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61513?format=api", "vulnerability_id": "VCID-5rck-gs8y-87bb", "summary": "A vulnerability has been discovered in cpio, which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2037.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2037.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2037", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.19449", "scoring_system": "epss", "scoring_elements": "0.95352", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.19449", "scoring_system": "epss", "scoring_elements": "0.95453", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.19449", "scoring_system": "epss", "scoring_elements": "0.95422", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.19449", "scoring_system": "epss", "scoring_elements": "0.9543", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.19449", "scoring_system": "epss", "scoring_elements": "0.95435", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.19449", "scoring_system": "epss", "scoring_elements": "0.95439", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.19449", "scoring_system": "epss", "scoring_elements": "0.95361", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.19449", "scoring_system": "epss", "scoring_elements": "0.95367", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.19449", "scoring_system": "epss", "scoring_elements": "0.95372", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.19449", "scoring_system": "epss", "scoring_elements": "0.95379", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.19449", "scoring_system": "epss", "scoring_elements": "0.95381", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.19449", "scoring_system": "epss", "scoring_elements": "0.95386", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.19449", "scoring_system": "epss", "scoring_elements": "0.95389", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.19449", "scoring_system": "epss", "scoring_elements": "0.95396", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.19449", "scoring_system": "epss", "scoring_elements": "0.954", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.19449", "scoring_system": "epss", "scoring_elements": "0.95403", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.19449", "scoring_system": "epss", "scoring_elements": "0.95404", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.19449", "scoring_system": "epss", "scoring_elements": "0.95406", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.19449", "scoring_system": "epss", "scoring_elements": "0.95407", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.19449", "scoring_system": "epss", "scoring_elements": "0.95416", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2037" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2037", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2037" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "1.5", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:S/C:N/I:N/A:P" }, { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3483", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3483" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/19/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/19/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/01/22/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/01/22/4" }, { "reference_url": "http://www.securityfocus.com/bid/82293", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/82293" }, { "reference_url": "http://www.securitytracker.com/id/1035067", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1035067" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2906-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2906-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300207", "reference_id": "1300207", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1300207" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812401", "reference_id": "812401", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812401" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:cpio:2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:cpio:2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:cpio:2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2037", "reference_id": "CVE-2016-2037", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2037" }, { "reference_url": "https://security.gentoo.org/glsa/202407-07", "reference_id": "GLSA-202407-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202407-07" }, { "reference_url": "https://usn.ubuntu.com/2906-1/", "reference_id": "USN-2906-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2906-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583733?format=api", "purl": "pkg:deb/debian/cpio@2.11%2Bdfsg-5?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.11%252Bdfsg-5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583610?format=api", "purl": "pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cguy-5d2j-6yed" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583611?format=api", "purl": "pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cguy-5d2j-6yed" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583612?format=api", "purl": "pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583613?format=api", "purl": "pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-2037" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5rck-gs8y-87bb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88947?format=api", "vulnerability_id": "VCID-7qhn-kqw8-puac", "summary": "cpio large filesize buffer overflow", "references": [ { "reference_url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:03.cpio.asc", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:03.cpio.asc" }, { "reference_url": "http://frontal1.mandriva.com/security/advisories?name=MDKSA-2005:237", "reference_id": "", "reference_type": "", "scores": [], "url": "http://frontal1.mandriva.com/security/advisories?name=MDKSA-2005:237" }, { "reference_url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-4268.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-4268.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-4268", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15772", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15695", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15734", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15798", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15604", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15689", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15748", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15714", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15679", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15615", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15541", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15551", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15601", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15644", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15642", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15585", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15456", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15576", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15658", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15699", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-4268" }, { "reference_url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172669" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4268", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4268" }, { "reference_url": "http://secunia.com/advisories/18251", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18251" }, { "reference_url": "http://secunia.com/advisories/18278", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18278" }, { "reference_url": "http://secunia.com/advisories/18280", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18280" }, { "reference_url": "http://secunia.com/advisories/18395", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18395" }, { "reference_url": "http://secunia.com/advisories/20117", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/20117" }, { "reference_url": "http://secunia.com/advisories/25098", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25098" }, { "reference_url": "http://secunia.com/advisories/25161", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25161" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23855", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23855" }, { "reference_url": "https://issues.rpath.com/browse/RPL-1338", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-1338" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10450", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10450" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6860", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6860" }, { "reference_url": "http://www.osvdb.org/22194", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.osvdb.org/22194" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0245.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2007-0245.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0145.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0145.html" }, { "reference_url": "http://www.securityfocus.com/bid/16057", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/16057" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=229191", "reference_id": "229191", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=229191" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=344134", "reference_id": "344134", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=344134" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:cpio:2.6-8:*:fedora_core_4_64bit:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:cpio:2.6-8:*:fedora_core_4_64bit:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:cpio:2.6-8:*:fedora_core_4_64bit:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4268", "reference_id": "CVE-2005-4268", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4268" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0245", "reference_id": "RHSA-2007:0245", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0245" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0145", "reference_id": "RHSA-2010:0145", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0145" }, { "reference_url": "https://usn.ubuntu.com/234-1/", "reference_id": "USN-234-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/234-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584814?format=api", "purl": "pkg:deb/debian/cpio@2.6-10?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.6-10%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583610?format=api", "purl": "pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cguy-5d2j-6yed" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583611?format=api", "purl": "pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cguy-5d2j-6yed" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583612?format=api", "purl": "pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583613?format=api", "purl": "pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2005-4268" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7qhn-kqw8-puac" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89130?format=api", "vulnerability_id": "VCID-93ev-1sjh-h7ab", "summary": "cpio directory traversal issue", "references": [ { "reference_url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:03.cpio.asc", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:03.cpio.asc" }, { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.2/SCOSA-2006.2.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.2/SCOSA-2006.2.txt" }, { "reference_url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.32/SCOSA-2005.32.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.32/SCOSA-2005.32.txt" }, { "reference_url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html" }, { "reference_url": "http://marc.info/?l=bugtraq&m=111403177526312&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=111403177526312&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1229.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1229.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-1229", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76685", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76455", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76459", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76488", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.7647", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76502", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76514", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.7654", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76518", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76513", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76554", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76558", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76546", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76579", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76584", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76597", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76585", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76615", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76633", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76619", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00962", "scoring_system": "epss", "scoring_elements": "0.76637", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-1229" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1229", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1229" }, { "reference_url": "http://secunia.com/advisories/16998", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/16998" }, { "reference_url": "http://secunia.com/advisories/17123", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17123" }, { "reference_url": "http://secunia.com/advisories/18290", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18290" }, { "reference_url": "http://secunia.com/advisories/18395", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18395" }, { "reference_url": "http://secunia.com/advisories/20117", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/20117" }, { "reference_url": "http://secunia.com/advisories/27857", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/27857" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20204", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20204" }, { "reference_url": "http://www.debian.org/security/2005/dsa-846", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-846" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:233", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:233" }, { "reference_url": "http://www.osvdb.org/17939", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.osvdb.org/17939" }, { "reference_url": "http://www.securityfocus.com/bid/13291", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/13291" }, { "reference_url": "http://www.ubuntu.com/usn/usn-189-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-189-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=156313", "reference_id": "156313", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156313" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=306693", "reference_id": "306693", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=306693" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:cpio:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:cpio:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:cpio:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1229", "reference_id": "CVE-2005-1229", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1229" }, { "reference_url": "https://usn.ubuntu.com/189-1/", "reference_id": "USN-189-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/189-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/585690?format=api", "purl": "pkg:deb/debian/cpio@2.6-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.6-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583610?format=api", "purl": "pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cguy-5d2j-6yed" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583611?format=api", "purl": "pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cguy-5d2j-6yed" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583612?format=api", "purl": "pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583613?format=api", "purl": "pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2005-1229" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-93ev-1sjh-h7ab" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61515?format=api", "vulnerability_id": "VCID-99j7-3sya-n3bx", "summary": "A vulnerability has been discovered in cpio, which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38185.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38185.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-38185", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.26333", "scoring_system": "epss", "scoring_elements": "0.96364", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.26333", "scoring_system": "epss", "scoring_elements": "0.9635", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.26333", "scoring_system": "epss", "scoring_elements": "0.96355", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.26706", "scoring_system": "epss", "scoring_elements": "0.96312", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.26706", "scoring_system": "epss", "scoring_elements": "0.9634", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.26706", "scoring_system": "epss", "scoring_elements": "0.96339", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.26706", "scoring_system": "epss", "scoring_elements": "0.96342", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.26706", "scoring_system": "epss", "scoring_elements": "0.96351", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.26706", "scoring_system": "epss", "scoring_elements": "0.96355", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.26706", "scoring_system": "epss", "scoring_elements": "0.96357", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.26706", "scoring_system": "epss", "scoring_elements": "0.96358", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.26706", "scoring_system": "epss", "scoring_elements": "0.96359", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.26706", "scoring_system": "epss", "scoring_elements": "0.96369", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.26706", "scoring_system": "epss", "scoring_elements": "0.96373", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.26706", "scoring_system": "epss", "scoring_elements": "0.96379", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.26706", "scoring_system": "epss", "scoring_elements": "0.96304", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.26706", "scoring_system": "epss", "scoring_elements": "0.96319", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.26706", "scoring_system": "epss", "scoring_elements": "0.96324", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.26706", "scoring_system": "epss", "scoring_elements": "0.96332", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.26706", "scoring_system": "epss", "scoring_elements": "0.96336", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-38185" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38185", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38185" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991731", "reference_id": "1991731", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1991731" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992045", "reference_id": "992045", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=992045" }, { "reference_url": "https://security.archlinux.org/AVG-2262", "reference_id": "AVG-2262", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2262" }, { "reference_url": "https://github.com/fangqyi/cpiopwn", "reference_id": "cpiopwn", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:10:43Z/" } ], "url": "https://github.com/fangqyi/cpiopwn" }, { "reference_url": "https://security.gentoo.org/glsa/202407-07", "reference_id": "GLSA-202407-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202407-07" }, { "reference_url": "https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=dd96882877721703e19272fe25034560b794061b", "reference_id": "?id=dd96882877721703e19272fe25034560b794061b", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:10:43Z/" } ], "url": "https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=dd96882877721703e19272fe25034560b794061b" }, { "reference_url": "https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00000.html", "reference_id": "msg00000.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:10:43Z/" } ], "url": "https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00000.html" }, { "reference_url": "https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00002.html", "reference_id": "msg00002.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:10:43Z/" } ], "url": "https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00002.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00007.html", "reference_id": "msg00007.html", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:10:43Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00007.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1991", "reference_id": "RHSA-2022:1991", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1991" }, { "reference_url": "https://usn.ubuntu.com/5064-1/", "reference_id": "USN-5064-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5064-1/" }, { "reference_url": "https://usn.ubuntu.com/5064-2/", "reference_id": "USN-5064-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5064-2/" }, { "reference_url": "https://usn.ubuntu.com/5064-3/", "reference_id": "USN-5064-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5064-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/585782?format=api", "purl": "pkg:deb/debian/cpio@2.13%2Bdfsg-5?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583610?format=api", "purl": "pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cguy-5d2j-6yed" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583611?format=api", "purl": "pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cguy-5d2j-6yed" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583612?format=api", "purl": "pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583613?format=api", "purl": "pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-38185" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-99j7-3sya-n3bx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77863?format=api", "vulnerability_id": "VCID-cguy-5d2j-6yed", "summary": "cpio: path traversal vulnerability", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-7207.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-7207.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-7207", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19139", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18914", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18903", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18916", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18927", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18818", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18797", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18753", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18633", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18717", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1882", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18781", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18813", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19191", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18907", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18986", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1904", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19048", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19001", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18949", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-7207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7207", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-07T20:19:09Z/" } ], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7207" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/01/05/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-07T20:19:09Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/01/05/1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059163", "reference_id": "1059163", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-07T20:19:09Z/" } ], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059163" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266856", "reference_id": "2266856", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266856" }, { "reference_url": "https://www.openwall.com/lists/oss-security/2023/12/21/8", "reference_id": "8", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-07T20:19:09Z/" } ], "url": "https://www.openwall.com/lists/oss-security/2023/12/21/8" }, { "reference_url": "https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=376d663340a9dc91c91a5849e5713f07571c1628", "reference_id": "?id=376d663340a9dc91c91a5849e5713f07571c1628", "reference_type": "", "scores": [ { "value": "4.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-07T20:19:09Z/" } ], "url": "https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=376d663340a9dc91c91a5849e5713f07571c1628" }, { "reference_url": "https://usn.ubuntu.com/6755-1/", "reference_id": "USN-6755-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6755-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/921936?format=api", "purl": "pkg:deb/debian/cpio@2.14%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.14%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583612?format=api", "purl": "pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583613?format=api", "purl": "pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-7207" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cguy-5d2j-6yed" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61514?format=api", "vulnerability_id": "VCID-epu2-8s66-sqcw", "summary": "A vulnerability has been discovered in cpio, which can lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14866.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-14866.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14866", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09213", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09214", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0926", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09186", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09265", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09309", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09315", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09285", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09272", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09165", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0916", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09313", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09362", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09316", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09287", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09201", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09361", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09435", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09413", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09443", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0951", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-14866" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14866", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14866" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765511", "reference_id": "1765511", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1765511" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941412", "reference_id": "941412", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941412" }, { "reference_url": "https://security.gentoo.org/glsa/202407-07", "reference_id": "GLSA-202407-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202407-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3908", "reference_id": "RHSA-2020:3908", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3908" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0949", "reference_id": "RHSA-2021:0949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0949" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1582", "reference_id": "RHSA-2021:1582", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1582" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0073", "reference_id": "RHSA-2022:0073", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0073" }, { "reference_url": "https://usn.ubuntu.com/4176-1/", "reference_id": "USN-4176-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4176-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/585693?format=api", "purl": "pkg:deb/debian/cpio@2.13%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583610?format=api", "purl": "pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cguy-5d2j-6yed" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583611?format=api", "purl": "pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cguy-5d2j-6yed" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583612?format=api", "purl": "pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583613?format=api", "purl": "pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-14866" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-epu2-8s66-sqcw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48444?format=api", "vulnerability_id": "VCID-ft5f-trap-43fa", "summary": "GNU cpio contains a buffer overflow vulnerability, possibly resulting in a\n Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4476.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4476.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4476", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.11809", "scoring_system": "epss", "scoring_elements": "0.93675", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.11809", "scoring_system": "epss", "scoring_elements": "0.93685", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.11809", "scoring_system": "epss", "scoring_elements": "0.93696", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.11809", "scoring_system": "epss", "scoring_elements": "0.93698", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.11809", "scoring_system": "epss", "scoring_elements": "0.93707", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.11809", "scoring_system": "epss", "scoring_elements": "0.93709", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11809", "scoring_system": "epss", "scoring_elements": "0.93714", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.11809", "scoring_system": "epss", "scoring_elements": "0.93715", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.11809", "scoring_system": "epss", "scoring_elements": "0.93732", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.11809", "scoring_system": "epss", "scoring_elements": "0.93739", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.11809", "scoring_system": "epss", "scoring_elements": "0.93742", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.12223", "scoring_system": "epss", "scoring_elements": "0.93876", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.12223", "scoring_system": "epss", "scoring_elements": "0.93873", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.12223", "scoring_system": "epss", "scoring_elements": "0.93872", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.12223", "scoring_system": "epss", "scoring_elements": "0.93881", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.12223", "scoring_system": "epss", "scoring_elements": "0.93891", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.12223", "scoring_system": "epss", "scoring_elements": "0.93901", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.12223", "scoring_system": "epss", "scoring_elements": "0.93904", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.12223", "scoring_system": "epss", "scoring_elements": "0.93908", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.12223", "scoring_system": "epss", "scoring_elements": "0.93923", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4476" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4476", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4476" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=280961", "reference_id": "280961", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=280961" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=441444", "reference_id": "441444", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=441444" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=449222", "reference_id": "449222", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=449222" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30766.c", "reference_id": "CVE-2007-4476;OSVDB-42149", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30766.c" }, { "reference_url": "https://www.securityfocus.com/bid/26445/info", "reference_id": "CVE-2007-4476;OSVDB-42149", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/26445/info" }, { "reference_url": "https://security.gentoo.org/glsa/200711-18", "reference_id": "GLSA-200711-18", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200711-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0141", "reference_id": "RHSA-2010:0141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0144", "reference_id": "RHSA-2010:0144", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0144" }, { "reference_url": "https://usn.ubuntu.com/650-1/", "reference_id": "USN-650-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/650-1/" }, { "reference_url": "https://usn.ubuntu.com/709-1/", "reference_id": "USN-709-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/709-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/586653?format=api", "purl": "pkg:deb/debian/cpio@2.9-5?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.9-5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583610?format=api", "purl": "pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cguy-5d2j-6yed" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583611?format=api", "purl": "pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cguy-5d2j-6yed" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583612?format=api", "purl": "pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583613?format=api", "purl": "pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2007-4476" ], "risk_score": 0.2, "exploitability": "2.0", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ft5f-trap-43fa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51211?format=api", "vulnerability_id": "VCID-mdgb-2uxr-hyg1", "summary": "Two vulnerabilities have been found in GNU cpio, the worst of which\n could result in execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9112.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9112.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9112", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01343", "scoring_system": "epss", "scoring_elements": "0.80221", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.01343", "scoring_system": "epss", "scoring_elements": "0.79987", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01343", "scoring_system": "epss", "scoring_elements": "0.79995", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01343", "scoring_system": "epss", "scoring_elements": "0.80017", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01343", "scoring_system": "epss", "scoring_elements": "0.80007", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01343", "scoring_system": "epss", "scoring_elements": "0.80035", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01343", "scoring_system": "epss", "scoring_elements": "0.80043", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01343", "scoring_system": "epss", "scoring_elements": "0.80063", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01343", "scoring_system": "epss", "scoring_elements": "0.80048", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01343", "scoring_system": "epss", "scoring_elements": "0.80039", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01343", "scoring_system": "epss", "scoring_elements": "0.80067", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01343", "scoring_system": "epss", "scoring_elements": "0.80068", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01343", "scoring_system": "epss", "scoring_elements": "0.80096", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01343", "scoring_system": "epss", "scoring_elements": "0.80101", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01343", "scoring_system": "epss", "scoring_elements": "0.80117", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01343", "scoring_system": "epss", "scoring_elements": "0.8013", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01343", "scoring_system": "epss", "scoring_elements": "0.80151", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01343", "scoring_system": "epss", "scoring_elements": "0.80166", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01343", "scoring_system": "epss", "scoring_elements": "0.80164", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01343", "scoring_system": "epss", "scoring_elements": "0.8018", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-9112" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9112", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9112" }, { "reference_url": "http://seclists.org/fulldisclosure/2014/Nov/74", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2014/Nov/74" }, { "reference_url": "http://secunia.com/advisories/60167", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/60167" }, { "reference_url": "http://secunia.com/advisories/62145", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/62145" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98918", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98918" }, { "reference_url": "https://savannah.gnu.org/bugs/?43709", "reference_id": "", "reference_type": "", "scores": [], "url": "https://savannah.gnu.org/bugs/?43709" }, { "reference_url": "http://www.debian.org/security/2014/dsa-3111", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2014/dsa-3111" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/11/23/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/11/23/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/11/25/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/11/25/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2014/11/26/20", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2014/11/26/20" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html" }, { "reference_url": "http://www.securityfocus.com/bid/71248", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/71248" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2456-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2456-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1167571", "reference_id": "1167571", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1167571" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=772793", "reference_id": "772793", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=772793" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:cpio:2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:cpio:2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:cpio:2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9112", "reference_id": "CVE-2014-9112", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-9112" }, { "reference_url": "https://security.gentoo.org/glsa/201502-11", "reference_id": "GLSA-201502-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201502-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2108", "reference_id": "RHSA-2015:2108", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2108" }, { "reference_url": "https://usn.ubuntu.com/2456-1/", "reference_id": "USN-2456-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2456-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583723?format=api", "purl": "pkg:deb/debian/cpio@2.11%2Bdfsg-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.11%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583610?format=api", "purl": "pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cguy-5d2j-6yed" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583611?format=api", "purl": "pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cguy-5d2j-6yed" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583612?format=api", "purl": "pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583613?format=api", "purl": "pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2014-9112" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mdgb-2uxr-hyg1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90256?format=api", "vulnerability_id": "VCID-qv55-fc5j-dyew", "summary": "security flaw", "references": [ { "reference_url": "http://marc.info/?l=bugtraq&m=110763404701519&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=110763404701519&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-1999-1572.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-1999-1572.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-1999-1572", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.33556", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.33807", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34145", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34177", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34037", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.3408", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34111", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34109", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34067", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34044", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34079", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.34031", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.33658", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.33637", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.33552", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.33436", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.33506", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.33546", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.33456", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.00139", "scoring_system": "epss", "scoring_elements": "0.3348", "published_at": "2026-05-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-1999-1572" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1572", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1572" }, { "reference_url": "http://secunia.com/advisories/14357", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/14357" }, { "reference_url": "http://secunia.com/advisories/17063", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17063" }, { "reference_url": "http://secunia.com/advisories/17532", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17532" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19167", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19167" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10888", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10888" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf" }, { "reference_url": "http://www.debian.org/security/2005/dsa-664", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-664" }, { "reference_url": "http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:032", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:032" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-073.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-073.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-080.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-080.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-806.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-806.html" }, { "reference_url": "http://www.trustix.org/errata/2005/0003/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2005/0003/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616458", "reference_id": "1616458", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616458" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=293379", "reference_id": "293379", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=293379" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:cs2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:cs2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:cs2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:cs3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandrakesoft:mandrake_linux:cs3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandrakesoft:mandrake_linux:cs3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:4.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-1999-1572", "reference_id": "CVE-1999-1572", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-1999-1572" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:073", "reference_id": "RHSA-2005:073", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:073" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:080", "reference_id": "RHSA-2005:080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:806", "reference_id": "RHSA-2005:806", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:806" }, { "reference_url": "https://usn.ubuntu.com/75-1/", "reference_id": "USN-75-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/75-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/585549?format=api", "purl": "pkg:deb/debian/cpio@2.5-1.2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.5-1.2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583610?format=api", "purl": "pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cguy-5d2j-6yed" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583611?format=api", "purl": "pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cguy-5d2j-6yed" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583612?format=api", "purl": "pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583613?format=api", "purl": "pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2.1%3Fdistro=trixie" } ], "aliases": [ "CVE-1999-1572" ], "risk_score": 0.9, "exploitability": "0.5", "weighted_severity": "1.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qv55-fc5j-dyew" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51212?format=api", "vulnerability_id": "VCID-tyqd-yqrc-bygr", "summary": "Two vulnerabilities have been found in GNU cpio, the worst of which\n could result in execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1197.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1197.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1197", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03332", "scoring_system": "epss", "scoring_elements": "0.87417", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.03332", "scoring_system": "epss", "scoring_elements": "0.87246", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03332", "scoring_system": "epss", "scoring_elements": "0.87262", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03332", "scoring_system": "epss", "scoring_elements": "0.87259", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03332", "scoring_system": "epss", "scoring_elements": "0.87278", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03332", "scoring_system": "epss", "scoring_elements": "0.87286", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03332", "scoring_system": "epss", "scoring_elements": "0.87299", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03332", "scoring_system": "epss", "scoring_elements": "0.87293", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03332", "scoring_system": "epss", "scoring_elements": "0.87289", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03332", "scoring_system": "epss", "scoring_elements": "0.87303", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03332", "scoring_system": "epss", "scoring_elements": "0.87308", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03332", "scoring_system": "epss", "scoring_elements": "0.87302", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03332", "scoring_system": "epss", "scoring_elements": "0.87369", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.03332", "scoring_system": "epss", "scoring_elements": "0.87383", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.03332", "scoring_system": "epss", "scoring_elements": "0.87236", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03332", "scoring_system": "epss", "scoring_elements": "0.87356", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.03332", "scoring_system": "epss", "scoring_elements": "0.87375", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.03421", "scoring_system": "epss", "scoring_elements": "0.87482", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03421", "scoring_system": "epss", "scoring_elements": "0.87489", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.03421", "scoring_system": "epss", "scoring_elements": "0.87502", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1197" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1197", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1197" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179773", "reference_id": "1179773", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1179773" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774669", "reference_id": "774669", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774669" }, { "reference_url": "https://security.gentoo.org/glsa/201502-11", "reference_id": "GLSA-201502-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201502-11" }, { "reference_url": "https://usn.ubuntu.com/2906-1/", "reference_id": "USN-2906-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2906-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/585307?format=api", "purl": "pkg:deb/debian/cpio@2.11%2Bdfsg-4.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.11%252Bdfsg-4.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583610?format=api", "purl": "pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cguy-5d2j-6yed" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583611?format=api", "purl": "pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cguy-5d2j-6yed" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583612?format=api", "purl": "pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583613?format=api", "purl": "pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2015-1197" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tyqd-yqrc-bygr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34111?format=api", "vulnerability_id": "VCID-zakj-27p6-6kbf", "summary": "A buffer overflow flaw in GNU Tar could result in execution of\n arbitrary code or a Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0624.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0624.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0624", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01474", "scoring_system": "epss", "scoring_elements": "0.80894", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01474", "scoring_system": "epss", "scoring_elements": "0.80902", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01474", "scoring_system": "epss", "scoring_elements": "0.80925", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01474", "scoring_system": "epss", "scoring_elements": "0.80923", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01474", "scoring_system": "epss", "scoring_elements": "0.80951", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01474", "scoring_system": "epss", "scoring_elements": "0.80958", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01474", "scoring_system": "epss", "scoring_elements": "0.80973", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01474", "scoring_system": "epss", "scoring_elements": "0.8096", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01474", "scoring_system": "epss", "scoring_elements": "0.80988", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01474", "scoring_system": "epss", "scoring_elements": "0.8099", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01474", "scoring_system": "epss", "scoring_elements": "0.81011", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01474", "scoring_system": "epss", "scoring_elements": "0.81021", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01474", "scoring_system": "epss", "scoring_elements": "0.81028", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01474", "scoring_system": "epss", "scoring_elements": "0.81041", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01474", "scoring_system": "epss", "scoring_elements": "0.81064", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01474", "scoring_system": "epss", "scoring_elements": "0.81085", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01474", "scoring_system": "epss", "scoring_elements": "0.81081", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01474", "scoring_system": "epss", "scoring_elements": "0.81099", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01474", "scoring_system": "epss", "scoring_elements": "0.8114", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0624" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=564368", "reference_id": "564368", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=564368" }, { "reference_url": "https://security.gentoo.org/glsa/201111-11", "reference_id": "GLSA-201111-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201111-11" }, { "reference_url": "https://security.gentoo.org/glsa/201311-21", "reference_id": "GLSA-201311-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201311-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0141", "reference_id": "RHSA-2010:0141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0142", "reference_id": "RHSA-2010:0142", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0142" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0143", "reference_id": "RHSA-2010:0143", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0143" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0144", "reference_id": "RHSA-2010:0144", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0144" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0145", "reference_id": "RHSA-2010:0145", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0145" }, { "reference_url": "https://usn.ubuntu.com/2456-1/", "reference_id": "USN-2456-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2456-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583609?format=api", "purl": "pkg:deb/debian/cpio@2.11-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.11-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583610?format=api", "purl": "pkg:deb/debian/cpio@2.13%2Bdfsg-7.1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cguy-5d2j-6yed" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583611?format=api", "purl": "pkg:deb/debian/cpio@2.13%2Bdfsg-7.1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-cguy-5d2j-6yed" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.13%252Bdfsg-7.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583612?format=api", "purl": "pkg:deb/debian/cpio@2.15%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/583613?format=api", "purl": "pkg:deb/debian/cpio@2.15%2Bdfsg-2.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2.1%3Fdistro=trixie" } ], "aliases": [ "CVE-2010-0624" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zakj-27p6-6kbf" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/cpio@2.15%252Bdfsg-2.1%3Fdistro=trixie" }