Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/sys-libs/glibc@2.30-r8
Typeebuild
Namespacesys-libs
Nameglibc
Version2.30-r8
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.32-r5
Latest_non_vulnerable_version2.41-r5
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-75dc-1fd5-u3e2
vulnerability_id VCID-75dc-1fd5-u3e2
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9169.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9169.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9169
reference_id
reference_type
scores
0
value 0.0708
scoring_system epss
scoring_elements 0.91586
published_at 2026-05-12T12:55:00Z
1
value 0.0708
scoring_system epss
scoring_elements 0.91541
published_at 2026-04-29T12:55:00Z
2
value 0.0708
scoring_system epss
scoring_elements 0.91536
published_at 2026-04-21T12:55:00Z
3
value 0.0708
scoring_system epss
scoring_elements 0.91544
published_at 2026-04-24T12:55:00Z
4
value 0.0708
scoring_system epss
scoring_elements 0.91543
published_at 2026-04-26T12:55:00Z
5
value 0.0708
scoring_system epss
scoring_elements 0.91555
published_at 2026-05-05T12:55:00Z
6
value 0.0708
scoring_system epss
scoring_elements 0.91568
published_at 2026-05-07T12:55:00Z
7
value 0.0708
scoring_system epss
scoring_elements 0.91578
published_at 2026-05-09T12:55:00Z
8
value 0.0708
scoring_system epss
scoring_elements 0.91576
published_at 2026-05-11T12:55:00Z
9
value 0.12135
scoring_system epss
scoring_elements 0.93818
published_at 2026-04-13T12:55:00Z
10
value 0.13732
scoring_system epss
scoring_elements 0.94268
published_at 2026-04-11T12:55:00Z
11
value 0.13732
scoring_system epss
scoring_elements 0.94228
published_at 2026-04-01T12:55:00Z
12
value 0.13732
scoring_system epss
scoring_elements 0.94264
published_at 2026-04-09T12:55:00Z
13
value 0.13732
scoring_system epss
scoring_elements 0.94238
published_at 2026-04-02T12:55:00Z
14
value 0.13732
scoring_system epss
scoring_elements 0.94249
published_at 2026-04-04T12:55:00Z
15
value 0.13732
scoring_system epss
scoring_elements 0.9425
published_at 2026-04-07T12:55:00Z
16
value 0.13732
scoring_system epss
scoring_elements 0.94259
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9169
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169
3
reference_url https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
reference_id
reference_type
scores
url https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140
4
reference_url https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
reference_id
reference_type
scores
url https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10278
reference_id
reference_type
scores
url https://kc.mcafee.com/corporate/index?page=content&id=SB10278
7
reference_url https://security.netapp.com/advisory/ntap-20190315-0002/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190315-0002/
8
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=24114
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=24114
9
reference_url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=583dd860d5b833037175247230a328f0050dbfe9
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=583dd860d5b833037175247230a328f0050dbfe9
10
reference_url https://support.f5.com/csp/article/K54823184
reference_id
reference_type
scores
url https://support.f5.com/csp/article/K54823184
11
reference_url https://www.oracle.com/security-alerts/cpuapr2022.html
reference_id
reference_type
scores
url https://www.oracle.com/security-alerts/cpuapr2022.html
12
reference_url http://www.securityfocus.com/bid/107160
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107160
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1684057
reference_id 1684057
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1684057
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924612
reference_id 924612
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924612
15
reference_url https://security.archlinux.org/ASA-201911-3
reference_id ASA-201911-3
reference_type
scores
url https://security.archlinux.org/ASA-201911-3
16
reference_url https://security.archlinux.org/AVG-855
reference_id AVG-855
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-855
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9169
reference_id CVE-2019-9169
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-9169
26
reference_url https://security.gentoo.org/glsa/202006-04
reference_id GLSA-202006-04
reference_type
scores
url https://security.gentoo.org/glsa/202006-04
27
reference_url https://access.redhat.com/errata/RHSA-2021:1585
reference_id RHSA-2021:1585
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1585
28
reference_url https://usn.ubuntu.com/4416-1/
reference_id USN-4416-1
reference_type
scores
url https://usn.ubuntu.com/4416-1/
fixed_packages
0
url pkg:ebuild/sys-libs/glibc@2.30-r8
purl pkg:ebuild/sys-libs/glibc@2.30-r8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.30-r8
aliases CVE-2019-9169
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-75dc-1fd5-u3e2
1
url VCID-c4w6-89qu-xkev
vulnerability_id VCID-c4w6-89qu-xkev
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7309.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7309.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-7309
reference_id
reference_type
scores
0
value 0.00166
scoring_system epss
scoring_elements 0.37601
published_at 2026-04-01T12:55:00Z
1
value 0.00166
scoring_system epss
scoring_elements 0.37765
published_at 2026-04-11T12:55:00Z
2
value 0.00166
scoring_system epss
scoring_elements 0.37783
published_at 2026-04-02T12:55:00Z
3
value 0.00166
scoring_system epss
scoring_elements 0.37809
published_at 2026-04-04T12:55:00Z
4
value 0.00166
scoring_system epss
scoring_elements 0.37687
published_at 2026-04-07T12:55:00Z
5
value 0.00166
scoring_system epss
scoring_elements 0.3775
published_at 2026-04-09T12:55:00Z
6
value 0.00166
scoring_system epss
scoring_elements 0.37738
published_at 2026-04-08T12:55:00Z
7
value 0.00217
scoring_system epss
scoring_elements 0.4406
published_at 2026-05-12T12:55:00Z
8
value 0.00217
scoring_system epss
scoring_elements 0.44094
published_at 2026-05-09T12:55:00Z
9
value 0.00217
scoring_system epss
scoring_elements 0.44031
published_at 2026-05-11T12:55:00Z
10
value 0.00217
scoring_system epss
scoring_elements 0.44304
published_at 2026-04-12T12:55:00Z
11
value 0.00217
scoring_system epss
scoring_elements 0.44303
published_at 2026-04-13T12:55:00Z
12
value 0.00217
scoring_system epss
scoring_elements 0.4436
published_at 2026-04-16T12:55:00Z
13
value 0.00217
scoring_system epss
scoring_elements 0.44351
published_at 2026-04-18T12:55:00Z
14
value 0.00217
scoring_system epss
scoring_elements 0.4428
published_at 2026-04-21T12:55:00Z
15
value 0.00217
scoring_system epss
scoring_elements 0.442
published_at 2026-04-24T12:55:00Z
16
value 0.00217
scoring_system epss
scoring_elements 0.44203
published_at 2026-04-26T12:55:00Z
17
value 0.00217
scoring_system epss
scoring_elements 0.44121
published_at 2026-04-29T12:55:00Z
18
value 0.00217
scoring_system epss
scoring_elements 0.44
published_at 2026-05-05T12:55:00Z
19
value 0.00217
scoring_system epss
scoring_elements 0.44077
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-7309
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7309
3
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=24155
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=24155
4
reference_url https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html
reference_id
reference_type
scores
url https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html
5
reference_url http://www.securityfocus.com/bid/106835
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106835
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1672232
reference_id 1672232
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1672232
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x86:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x86:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x86:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-7309
reference_id CVE-2019-7309
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-7309
9
reference_url https://security.gentoo.org/glsa/202006-04
reference_id GLSA-202006-04
reference_type
scores
url https://security.gentoo.org/glsa/202006-04
fixed_packages
0
url pkg:ebuild/sys-libs/glibc@2.30-r8
purl pkg:ebuild/sys-libs/glibc@2.30-r8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.30-r8
aliases CVE-2019-7309
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c4w6-89qu-xkev
2
url VCID-mqch-gxfq-zyhh
vulnerability_id VCID-mqch-gxfq-zyhh
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10029.json
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10029.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-10029
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12802
published_at 2026-04-01T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.129
published_at 2026-04-02T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.1295
published_at 2026-04-04T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12753
published_at 2026-04-07T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12833
published_at 2026-04-08T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12884
published_at 2026-04-09T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.1285
published_at 2026-04-11T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12812
published_at 2026-04-12T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12767
published_at 2026-04-13T12:55:00Z
9
value 0.00042
scoring_system epss
scoring_elements 0.1267
published_at 2026-04-16T12:55:00Z
10
value 0.00042
scoring_system epss
scoring_elements 0.12677
published_at 2026-04-18T12:55:00Z
11
value 0.0005
scoring_system epss
scoring_elements 0.15699
published_at 2026-05-12T12:55:00Z
12
value 0.0005
scoring_system epss
scoring_elements 0.15601
published_at 2026-04-21T12:55:00Z
13
value 0.0005
scoring_system epss
scoring_elements 0.15644
published_at 2026-04-24T12:55:00Z
14
value 0.0005
scoring_system epss
scoring_elements 0.15642
published_at 2026-04-26T12:55:00Z
15
value 0.0005
scoring_system epss
scoring_elements 0.15584
published_at 2026-04-29T12:55:00Z
16
value 0.0005
scoring_system epss
scoring_elements 0.15455
published_at 2026-05-05T12:55:00Z
17
value 0.0005
scoring_system epss
scoring_elements 0.15576
published_at 2026-05-07T12:55:00Z
18
value 0.0005
scoring_system epss
scoring_elements 0.15679
published_at 2026-05-09T12:55:00Z
19
value 0.0005
scoring_system epss
scoring_elements 0.15658
published_at 2026-05-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-10029
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1810670
reference_id 1810670
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1810670
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953108
reference_id 953108
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953108
6
reference_url https://security.gentoo.org/glsa/202006-04
reference_id GLSA-202006-04
reference_type
scores
url https://security.gentoo.org/glsa/202006-04
7
reference_url https://access.redhat.com/errata/RHSA-2020:4444
reference_id RHSA-2020:4444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4444
8
reference_url https://access.redhat.com/errata/RHSA-2021:0348
reference_id RHSA-2021:0348
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0348
9
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
10
reference_url https://access.redhat.com/errata/RHSA-2021:2998
reference_id RHSA-2021:2998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2998
11
reference_url https://access.redhat.com/errata/RHSA-2021:3315
reference_id RHSA-2021:3315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3315
12
reference_url https://usn.ubuntu.com/4416-1/
reference_id USN-4416-1
reference_type
scores
url https://usn.ubuntu.com/4416-1/
fixed_packages
0
url pkg:ebuild/sys-libs/glibc@2.30-r8
purl pkg:ebuild/sys-libs/glibc@2.30-r8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.30-r8
aliases CVE-2020-10029
risk_score 2.5
exploitability 0.5
weighted_severity 5.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mqch-gxfq-zyhh
3
url VCID-pyms-pya1-buck
vulnerability_id VCID-pyms-pya1-buck
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1751.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1751.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-1751
reference_id
reference_type
scores
0
value 0.00138
scoring_system epss
scoring_elements 0.33535
published_at 2026-04-01T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.33687
published_at 2026-04-02T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.33719
published_at 2026-04-04T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.33558
published_at 2026-04-07T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.33601
published_at 2026-04-08T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.33634
published_at 2026-04-09T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.3363
published_at 2026-04-11T12:55:00Z
7
value 0.00138
scoring_system epss
scoring_elements 0.33589
published_at 2026-04-12T12:55:00Z
8
value 0.00138
scoring_system epss
scoring_elements 0.33566
published_at 2026-04-13T12:55:00Z
9
value 0.00138
scoring_system epss
scoring_elements 0.33599
published_at 2026-04-16T12:55:00Z
10
value 0.00138
scoring_system epss
scoring_elements 0.33575
published_at 2026-04-18T12:55:00Z
11
value 0.00244
scoring_system epss
scoring_elements 0.47644
published_at 2026-05-12T12:55:00Z
12
value 0.00244
scoring_system epss
scoring_elements 0.47732
published_at 2026-04-21T12:55:00Z
13
value 0.00244
scoring_system epss
scoring_elements 0.47714
published_at 2026-04-24T12:55:00Z
14
value 0.00244
scoring_system epss
scoring_elements 0.47723
published_at 2026-04-26T12:55:00Z
15
value 0.00244
scoring_system epss
scoring_elements 0.47669
published_at 2026-04-29T12:55:00Z
16
value 0.00244
scoring_system epss
scoring_elements 0.47585
published_at 2026-05-05T12:55:00Z
17
value 0.00244
scoring_system epss
scoring_elements 0.47651
published_at 2026-05-07T12:55:00Z
18
value 0.00244
scoring_system epss
scoring_elements 0.47673
published_at 2026-05-09T12:55:00Z
19
value 0.00244
scoring_system epss
scoring_elements 0.47615
published_at 2026-05-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-1751
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1810719
reference_id 1810719
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1810719
5
reference_url https://security.gentoo.org/glsa/202006-04
reference_id GLSA-202006-04
reference_type
scores
url https://security.gentoo.org/glsa/202006-04
6
reference_url https://access.redhat.com/errata/RHSA-2020:4444
reference_id RHSA-2020:4444
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4444
7
reference_url https://usn.ubuntu.com/4416-1/
reference_id USN-4416-1
reference_type
scores
url https://usn.ubuntu.com/4416-1/
fixed_packages
0
url pkg:ebuild/sys-libs/glibc@2.30-r8
purl pkg:ebuild/sys-libs/glibc@2.30-r8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.30-r8
aliases CVE-2020-1751
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pyms-pya1-buck
4
url VCID-rt4z-2rd4-qfde
vulnerability_id VCID-rt4z-2rd4-qfde
summary
Multiple vulnerabilities have been found in glibc, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6488.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6488.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-6488
reference_id
reference_type
scores
0
value 0.00149
scoring_system epss
scoring_elements 0.35327
published_at 2026-04-01T12:55:00Z
1
value 0.00149
scoring_system epss
scoring_elements 0.34997
published_at 2026-05-12T12:55:00Z
2
value 0.00149
scoring_system epss
scoring_elements 0.35067
published_at 2026-05-09T12:55:00Z
3
value 0.00149
scoring_system epss
scoring_elements 0.34972
published_at 2026-05-11T12:55:00Z
4
value 0.00149
scoring_system epss
scoring_elements 0.35526
published_at 2026-04-02T12:55:00Z
5
value 0.00149
scoring_system epss
scoring_elements 0.35552
published_at 2026-04-04T12:55:00Z
6
value 0.00149
scoring_system epss
scoring_elements 0.35434
published_at 2026-04-07T12:55:00Z
7
value 0.00149
scoring_system epss
scoring_elements 0.3548
published_at 2026-04-08T12:55:00Z
8
value 0.00149
scoring_system epss
scoring_elements 0.35505
published_at 2026-04-09T12:55:00Z
9
value 0.00149
scoring_system epss
scoring_elements 0.35514
published_at 2026-04-11T12:55:00Z
10
value 0.00149
scoring_system epss
scoring_elements 0.35471
published_at 2026-04-12T12:55:00Z
11
value 0.00149
scoring_system epss
scoring_elements 0.35449
published_at 2026-04-13T12:55:00Z
12
value 0.00149
scoring_system epss
scoring_elements 0.35489
published_at 2026-04-16T12:55:00Z
13
value 0.00149
scoring_system epss
scoring_elements 0.35478
published_at 2026-04-18T12:55:00Z
14
value 0.00149
scoring_system epss
scoring_elements 0.35426
published_at 2026-04-21T12:55:00Z
15
value 0.00149
scoring_system epss
scoring_elements 0.3519
published_at 2026-04-24T12:55:00Z
16
value 0.00149
scoring_system epss
scoring_elements 0.35168
published_at 2026-04-26T12:55:00Z
17
value 0.00149
scoring_system epss
scoring_elements 0.35087
published_at 2026-04-29T12:55:00Z
18
value 0.00149
scoring_system epss
scoring_elements 0.34966
published_at 2026-05-05T12:55:00Z
19
value 0.00149
scoring_system epss
scoring_elements 0.35038
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-6488
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6488
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6488
3
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=24097
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=24097
4
reference_url http://www.securityfocus.com/bid/106671
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/106671
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1667931
reference_id 1667931
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1667931
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-6488
reference_id CVE-2019-6488
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-6488
8
reference_url https://security.gentoo.org/glsa/202006-04
reference_id GLSA-202006-04
reference_type
scores
url https://security.gentoo.org/glsa/202006-04
fixed_packages
0
url pkg:ebuild/sys-libs/glibc@2.30-r8
purl pkg:ebuild/sys-libs/glibc@2.30-r8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.30-r8
aliases CVE-2019-6488
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rt4z-2rd4-qfde
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.30-r8