{"url":"http://public2.vulnerablecode.io/api/packages/85727?format=json","purl":"pkg:ebuild/sys-libs/glibc@2.19-r1","type":"ebuild","namespace":"sys-libs","name":"glibc","version":"2.19-r1","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.21-r2","latest_non_vulnerable_version":"2.41-r5","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54361?format=json","vulnerability_id":"VCID-1971-5hzf-43dt","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html"},{"reference_url":"http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html"},{"reference_url":"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4043.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4043.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4043","reference_id":"","reference_type":"","scores":[{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.8216","published_at":"2026-05-16T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81888","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81899","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81922","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81918","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81945","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81952","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81972","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81961","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81956","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81991","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81993","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.82016","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.82027","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.82032","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.82051","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.82071","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.82096","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.82093","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.8211","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.82151","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.82158","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jun/18","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jun/18"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Sep/7","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Sep/7"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/93784","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/93784"},{"reference_url":"https://seclists.org/bugtraq/2019/Jun/14","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jun/14"},{"reference_url":"https://seclists.org/bugtraq/2019/Sep/7","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Sep/7"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=17048","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=17048"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=ChangeLog%3Bh=3020b9ac232315df362521aeaf85f21cb9926db8%3Bhp=d86e73963dd9fb5e21b1a28326630337226812aa%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=ChangeLog%3Bh=3020b9ac232315df362521aeaf85f21cb9926db8%3Bhp=d86e73963dd9fb5e21b1a28326630337226812aa%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=posix/spawn_faction_addopen.c%3Bh=40800b8e6e81341501c0fb8a91009529e2048dec%3Bhp=47f62425b696a4fdd511b2a057746322eb6518db%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=posix/spawn_faction_addopen.c%3Bh=40800b8e6e81341501c0fb8a91009529e2048dec%3Bhp=47f62425b696a4fdd511b2a057746322eb6518db%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=89e435f3559c53084498e9baad22172b64429362","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=89e435f3559c53084498e9baad22172b64429362"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:152","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:152"},{"reference_url":"http://www.securityfocus.com/bid/68006","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/68006"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1109263","reference_id":"1109263","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1109263"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751774","reference_id":"751774","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751774"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4043","reference_id":"CVE-2014-4043","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4043"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://usn.ubuntu.com/2306-1/","reference_id":"USN-2306-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2306-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85727?format=json","purl":"pkg:ebuild/sys-libs/glibc@2.19-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"}],"aliases":["CVE-2014-4043"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1971-5hzf-43dt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61763?format=json","vulnerability_id":"VCID-22vv-9xn4-vyap","summary":"Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3404.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3404.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3404","reference_id":"","reference_type":"","scores":[{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.6952","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69531","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69546","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69525","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69575","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69592","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69614","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69599","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69585","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69624","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69633","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69666","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69675","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.6968","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69655","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69699","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69732","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69702","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69728","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69777","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69788","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69803","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3404"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681473","reference_id":"681473","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681473"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=833703","reference_id":"833703","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=833703"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1098","reference_id":"RHSA-2012:1098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1200","reference_id":"RHSA-2012:1200","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1200"},{"reference_url":"https://usn.ubuntu.com/1589-1/","reference_id":"USN-1589-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1589-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85727?format=json","purl":"pkg:ebuild/sys-libs/glibc@2.19-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"}],"aliases":["CVE-2012-3404"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-22vv-9xn4-vyap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61767?format=json","vulnerability_id":"VCID-42jj-9jmf-s3h5","summary":"Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4424.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4424.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4424","reference_id":"","reference_type":"","scores":[{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.6964","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69652","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69668","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69645","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69696","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69713","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69735","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.6972","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69707","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69747","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69756","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69737","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69789","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69797","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69801","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69775","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69819","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.6985","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69845","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69895","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69906","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69919","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4424"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4424","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4424"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689423","reference_id":"689423","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689423"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=858238","reference_id":"858238","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=858238"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://usn.ubuntu.com/1991-1/","reference_id":"USN-1991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1991-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85727?format=json","purl":"pkg:ebuild/sys-libs/glibc@2.19-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"}],"aliases":["CVE-2012-4424"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-42jj-9jmf-s3h5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61766?format=json","vulnerability_id":"VCID-byqx-z785-6qcq","summary":"Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4412.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4412.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4412","reference_id":"","reference_type":"","scores":[{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95243","published_at":"2026-04-01T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95255","published_at":"2026-04-02T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95258","published_at":"2026-04-04T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95262","published_at":"2026-04-07T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.9527","published_at":"2026-04-08T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95272","published_at":"2026-04-09T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95277","published_at":"2026-04-11T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95278","published_at":"2026-04-12T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95281","published_at":"2026-04-13T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95289","published_at":"2026-04-16T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95293","published_at":"2026-04-18T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95296","published_at":"2026-04-21T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95297","published_at":"2026-04-24T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95299","published_at":"2026-04-29T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95311","published_at":"2026-05-05T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95317","published_at":"2026-05-07T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95325","published_at":"2026-05-09T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95331","published_at":"2026-05-11T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95337","published_at":"2026-05-12T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.9535","published_at":"2026-05-14T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95352","published_at":"2026-05-15T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95353","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687530","reference_id":"687530","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687530"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=855385","reference_id":"855385","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=855385"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/37783.c","reference_id":"CVE-2012-4412;OSVDB-98142","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/37783.c"},{"reference_url":"https://www.securityfocus.com/bid/55462/info","reference_id":"CVE-2012-4412;OSVDB-98142","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/55462/info"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://usn.ubuntu.com/1991-1/","reference_id":"USN-1991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1991-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85727?format=json","purl":"pkg:ebuild/sys-libs/glibc@2.19-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"}],"aliases":["CVE-2012-4412"],"risk_score":0.4,"exploitability":"2.0","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-byqx-z785-6qcq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54412?format=json","vulnerability_id":"VCID-e9fg-s2r5-qfc2","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6656.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6656.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6656","reference_id":"","reference_type":"","scores":[{"value":"0.01184","scoring_system":"epss","scoring_elements":"0.78981","published_at":"2026-05-16T12:55:00Z"},{"value":"0.01184","scoring_system":"epss","scoring_elements":"0.78961","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01184","scoring_system":"epss","scoring_elements":"0.78974","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78948","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78972","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78978","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79002","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78987","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78976","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79004","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.7893","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79032","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79038","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79069","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79089","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79106","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79104","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79119","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79001","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78936","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78964","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=14134","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=14134"},{"reference_url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=6e230d11837f3ae7b375ea69d7905f0d18eb79e5","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=6e230d11837f3ae7b375ea69d7905f0d18eb79e5"},{"reference_url":"http://www.debian.org/security/2015/dsa-3142","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3142"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:175","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:175"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/08/29/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/08/29/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/09/02/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/09/02/1"},{"reference_url":"http://www.securityfocus.com/bid/69472","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/69472"},{"reference_url":"http://www.ubuntu.com/usn/USN-2432-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2432-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1135840","reference_id":"1135840","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1135840"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6656","reference_id":"CVE-2012-6656","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6656"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://usn.ubuntu.com/2432-1/","reference_id":"USN-2432-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2432-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85727?format=json","purl":"pkg:ebuild/sys-libs/glibc@2.19-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"}],"aliases":["CVE-2012-6656"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e9fg-s2r5-qfc2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54359?format=json","vulnerability_id":"VCID-hkyd-8rrg-v3e7","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3406.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3406.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3406","reference_id":"","reference_type":"","scores":[{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75132","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75135","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75165","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75142","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75176","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75188","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75209","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75187","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75213","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75219","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75208","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75246","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.7525","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75254","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75263","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75291","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75316","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75297","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75305","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.7536","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75365","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75375","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681888","reference_id":"681888","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681888"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=826943","reference_id":"826943","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=826943"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1097","reference_id":"RHSA-2012:1097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1098","reference_id":"RHSA-2012:1098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1200","reference_id":"RHSA-2012:1200","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1200"},{"reference_url":"https://usn.ubuntu.com/1589-1/","reference_id":"USN-1589-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1589-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85727?format=json","purl":"pkg:ebuild/sys-libs/glibc@2.19-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"}],"aliases":["CVE-2012-3406"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hkyd-8rrg-v3e7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61770?format=json","vulnerability_id":"VCID-kpcn-f4dw-97hm","summary":"Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2207.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2207.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2207","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21629","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21651","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21822","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21874","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21627","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21703","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2176","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21771","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21732","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21675","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21683","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21653","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21505","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21499","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21486","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21392","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21457","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21542","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21517","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21537","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21609","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2207"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717544","reference_id":"717544","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717544"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=976408","reference_id":"976408","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=976408"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://usn.ubuntu.com/2985-1/","reference_id":"USN-2985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2985-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85727?format=json","purl":"pkg:ebuild/sys-libs/glibc@2.19-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"}],"aliases":["CVE-2013-2207"],"risk_score":1.0,"exploitability":"0.5","weighted_severity":"2.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kpcn-f4dw-97hm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54415?format=json","vulnerability_id":"VCID-mt93-6b2q-1faf","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0235.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0235.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0235","reference_id":"","reference_type":"","scores":[{"value":"0.8487","scoring_system":"epss","scoring_elements":"0.99349","published_at":"2026-04-21T12:55:00Z"},{"value":"0.8487","scoring_system":"epss","scoring_elements":"0.99347","published_at":"2026-04-13T12:55:00Z"},{"value":"0.8487","scoring_system":"epss","scoring_elements":"0.9935","published_at":"2026-04-18T12:55:00Z"},{"value":"0.86662","scoring_system":"epss","scoring_elements":"0.9942","published_at":"2026-04-11T12:55:00Z"},{"value":"0.86662","scoring_system":"epss","scoring_elements":"0.99433","published_at":"2026-05-16T12:55:00Z"},{"value":"0.86662","scoring_system":"epss","scoring_elements":"0.99415","published_at":"2026-04-02T12:55:00Z"},{"value":"0.86662","scoring_system":"epss","scoring_elements":"0.99417","published_at":"2026-04-04T12:55:00Z"},{"value":"0.86662","scoring_system":"epss","scoring_elements":"0.9943","published_at":"2026-05-12T12:55:00Z"},{"value":"0.86662","scoring_system":"epss","scoring_elements":"0.99431","published_at":"2026-05-15T12:55:00Z"},{"value":"0.86662","scoring_system":"epss","scoring_elements":"0.99416","published_at":"2026-04-01T12:55:00Z"},{"value":"0.86662","scoring_system":"epss","scoring_elements":"0.99426","published_at":"2026-04-29T12:55:00Z"},{"value":"0.86662","scoring_system":"epss","scoring_elements":"0.99427","published_at":"2026-05-07T12:55:00Z"},{"value":"0.86662","scoring_system":"epss","scoring_elements":"0.99428","published_at":"2026-05-11T12:55:00Z"},{"value":"0.86966","scoring_system":"epss","scoring_elements":"0.99432","published_at":"2026-04-09T12:55:00Z"},{"value":"0.86966","scoring_system":"epss","scoring_elements":"0.99431","published_at":"2026-04-08T12:55:00Z"},{"value":"0.86966","scoring_system":"epss","scoring_elements":"0.9943","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0235"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183461","reference_id":"1183461","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183461"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35951.py","reference_id":"CVE-2015-0235;OSVDB-117579","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35951.py"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/36421.rb","reference_id":"CVE-2015-0235;OSVDB-117579","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/36421.rb"},{"reference_url":"https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt","reference_id":"CVE-2015-0235;OSVDB-117579","reference_type":"exploit","scores":[],"url":"https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0090","reference_id":"RHSA-2015:0090","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0090"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0092","reference_id":"RHSA-2015:0092","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0092"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0099","reference_id":"RHSA-2015:0099","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0101","reference_id":"RHSA-2015:0101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0126","reference_id":"RHSA-2015:0126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0126"},{"reference_url":"https://usn.ubuntu.com/2485-1/","reference_id":"USN-2485-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2485-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85727?format=json","purl":"pkg:ebuild/sys-libs/glibc@2.19-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"}],"aliases":["CVE-2015-0235"],"risk_score":1.6,"exploitability":"2.0","weighted_severity":"0.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mt93-6b2q-1faf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61774?format=json","vulnerability_id":"VCID-nrvz-y7zn-6bgu","summary":"Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4788.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4788.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4788","reference_id":"","reference_type":"","scores":[{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.9179","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91799","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91804","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91813","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91825","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91832","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91835","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91837","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91833","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91853","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.9185","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91855","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91854","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91849","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91863","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91874","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91884","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91883","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.9189","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91904","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91913","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91906","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717178","reference_id":"717178","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717178"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=985625","reference_id":"985625","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=985625"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/28657.c","reference_id":"CVE-2013-4788;OSVDB-95392","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/28657.c"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85727?format=json","purl":"pkg:ebuild/sys-libs/glibc@2.19-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"}],"aliases":["CVE-2013-4788"],"risk_score":0.2,"exploitability":"2.0","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nrvz-y7zn-6bgu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61765?format=json","vulnerability_id":"VCID-rp43-q42n-jkh5","summary":"Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085190.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085190.html"},{"reference_url":"http://osvdb.org/84710","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/84710"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1207.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1207.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1208.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1208.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1262.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1262.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1325.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1325.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3480.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3480.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3480","reference_id":"","reference_type":"","scores":[{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42307","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42399","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42407","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42429","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42393","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42364","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42413","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42388","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42316","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.4225","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42381","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42411","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.4235","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52437","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52467","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52546","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52556","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52562","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52481","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52442","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52385","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3480"},{"reference_url":"http://secunia.com/advisories/50201","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50201"},{"reference_url":"http://secunia.com/advisories/50422","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50422"},{"reference_url":"http://sourceware.org/bugzilla/show_bug.cgi?id=14459","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/bugzilla/show_bug.cgi?id=14459"},{"reference_url":"http://sourceware.org/ml/libc-alpha/2012-08/msg00202.html","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/ml/libc-alpha/2012-08/msg00202.html"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/08/13/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/08/13/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/08/13/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/08/13/6"},{"reference_url":"http://www.securityfocus.com/bid/54982","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/54982"},{"reference_url":"http://www.securitytracker.com/id?1027374","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1027374"},{"reference_url":"http://www.ubuntu.com/usn/USN-1589-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1589-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=847715","reference_id":"847715","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=847715"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3480","reference_id":"CVE-2012-3480","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3480"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/37631.c","reference_id":"CVE-2012-3480;OSVDB-84710","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/37631.c"},{"reference_url":"https://www.securityfocus.com/bid/54982/info","reference_id":"CVE-2012-3480;OSVDB-84710","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/54982/info"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1207","reference_id":"RHSA-2012:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1208","reference_id":"RHSA-2012:1208","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1208"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1325","reference_id":"RHSA-2012:1325","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1325"},{"reference_url":"https://usn.ubuntu.com/1589-1/","reference_id":"USN-1589-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1589-1/"},{"reference_url":"https://usn.ubuntu.com/1589-2/","reference_id":"USN-1589-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1589-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85727?format=json","purl":"pkg:ebuild/sys-libs/glibc@2.19-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"}],"aliases":["CVE-2012-3480"],"risk_score":8.2,"exploitability":"2.0","weighted_severity":"4.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rp43-q42n-jkh5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61764?format=json","vulnerability_id":"VCID-skgp-p9xp-k3cf","summary":"Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3405.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3405.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3405","reference_id":"","reference_type":"","scores":[{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71191","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.712","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71218","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71192","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71234","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71249","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71271","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71256","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.7124","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71287","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71293","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.7127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71323","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.7133","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71334","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.7132","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71356","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71391","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71354","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71382","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71438","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71447","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.7146","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3405"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681473","reference_id":"681473","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681473"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=833704","reference_id":"833704","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=833704"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1098","reference_id":"RHSA-2012:1098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1200","reference_id":"RHSA-2012:1200","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1200"},{"reference_url":"https://usn.ubuntu.com/1589-1/","reference_id":"USN-1589-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1589-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85727?format=json","purl":"pkg:ebuild/sys-libs/glibc@2.19-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"}],"aliases":["CVE-2012-3405"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-skgp-p9xp-k3cf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61769?format=json","vulnerability_id":"VCID-tdxd-r347-3yex","summary":"Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .","references":[{"reference_url":"http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0769.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0769.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1605.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-1605.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1914.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1914.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1914","reference_id":"","reference_type":"","scores":[{"value":"0.03104","scoring_system":"epss","scoring_elements":"0.8696","published_at":"2026-05-16T12:55:00Z"},{"value":"0.03104","scoring_system":"epss","scoring_elements":"0.86847","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03104","scoring_system":"epss","scoring_elements":"0.86853","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03104","scoring_system":"epss","scoring_elements":"0.86877","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03104","scoring_system":"epss","scoring_elements":"0.86895","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03104","scoring_system":"epss","scoring_elements":"0.86913","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03104","scoring_system":"epss","scoring_elements":"0.86909","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03104","scoring_system":"epss","scoring_elements":"0.86922","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03104","scoring_system":"epss","scoring_elements":"0.86951","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03104","scoring_system":"epss","scoring_elements":"0.86959","published_at":"2026-05-15T12:55:00Z"},{"value":"0.03104","scoring_system":"epss","scoring_elements":"0.86827","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03104","scoring_system":"epss","scoring_elements":"0.86831","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03104","scoring_system":"epss","scoring_elements":"0.8683","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03398","scoring_system":"epss","scoring_elements":"0.87359","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03398","scoring_system":"epss","scoring_elements":"0.87369","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03398","scoring_system":"epss","scoring_elements":"0.87384","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03398","scoring_system":"epss","scoring_elements":"0.87403","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03398","scoring_system":"epss","scoring_elements":"0.8741","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03398","scoring_system":"epss","scoring_elements":"0.87422","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03398","scoring_system":"epss","scoring_elements":"0.87417","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03398","scoring_system":"epss","scoring_elements":"0.87413","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1914"},{"reference_url":"https://bugzilla.novell.com/show_bug.cgi?id=813121","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.novell.com/show_bug.cgi?id=813121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914"},{"reference_url":"http://seclists.org/fulldisclosure/2021/Sep/0","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2021/Sep/0"},{"reference_url":"http://secunia.com/advisories/52817","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/52817"},{"reference_url":"http://secunia.com/advisories/55113","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/55113"},{"reference_url":"http://sourceware.org/bugzilla/show_bug.cgi?id=15330","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/bugzilla/show_bug.cgi?id=15330"},{"reference_url":"http://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=1cef1b19089528db11f221e938f60b9b048945d7","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=1cef1b19089528db11f221e938f60b9b048945d7"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:163","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:163"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:283","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:283"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:284","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:284"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/04/03/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/04/03/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/04/03/8","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/04/03/8"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/04/05/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/04/05/1"},{"reference_url":"http://www.securityfocus.com/bid/58839","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/58839"},{"reference_url":"http://www.ubuntu.com/usn/USN-1991-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1991-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2014-0008.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2014-0008.html"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704623","reference_id":"704623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704623"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=947882","reference_id":"947882","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=947882"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1914","reference_id":"CVE-2013-1914","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1914"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0769","reference_id":"RHSA-2013:0769","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0769"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1605","reference_id":"RHSA-2013:1605","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1605"},{"reference_url":"https://usn.ubuntu.com/1991-1/","reference_id":"USN-1991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1991-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85727?format=json","purl":"pkg:ebuild/sys-libs/glibc@2.19-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"}],"aliases":["CVE-2013-1914"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tdxd-r347-3yex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61773?format=json","vulnerability_id":"VCID-w1zk-1c5m-3fb2","summary":"Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4458.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4458.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4458","reference_id":"","reference_type":"","scores":[{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.78873","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.78879","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.78908","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.78889","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.78914","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.7892","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.78944","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.78929","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.78948","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.78945","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.78974","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.7898","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.78997","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.79013","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.79034","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.79048","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.79046","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.79062","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.791","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.79108","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.79115","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4458"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1022280","reference_id":"1022280","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1022280"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=727181","reference_id":"727181","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=727181"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1391","reference_id":"RHSA-2014:1391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1391"},{"reference_url":"https://usn.ubuntu.com/2306-1/","reference_id":"USN-2306-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2306-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85727?format=json","purl":"pkg:ebuild/sys-libs/glibc@2.19-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"}],"aliases":["CVE-2013-4458"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w1zk-1c5m-3fb2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61772?format=json","vulnerability_id":"VCID-ydrg-f673-53gv","summary":"Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4332.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4332.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4332","reference_id":"","reference_type":"","scores":[{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.81904","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.81915","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.81938","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.81934","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.81961","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.81968","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.81988","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.81976","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.81971","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.82007","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.82009","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.82031","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.82043","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.82047","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.82065","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.82086","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.82111","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.82108","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.82124","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.82166","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.82173","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.82175","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1007545","reference_id":"1007545","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1007545"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722536","reference_id":"722536","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722536"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1411","reference_id":"RHSA-2013:1411","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1411"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1605","reference_id":"RHSA-2013:1605","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1605"},{"reference_url":"https://usn.ubuntu.com/1991-1/","reference_id":"USN-1991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1991-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85727?format=json","purl":"pkg:ebuild/sys-libs/glibc@2.19-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"}],"aliases":["CVE-2013-4332"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ydrg-f673-53gv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61771?format=json","vulnerability_id":"VCID-yh8v-ebxn-z7dp","summary":"Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4237.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4237.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4237","reference_id":"","reference_type":"","scores":[{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77497","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77503","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77528","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77508","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77538","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77547","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77573","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77558","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77556","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77594","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77592","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77586","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77619","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77626","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77641","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77651","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.7768","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77698","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77687","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77705","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77751","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77765","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77771","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4237"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=719558","reference_id":"719558","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=719558"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=995839","reference_id":"995839","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=995839"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1391","reference_id":"RHSA-2014:1391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1391"},{"reference_url":"https://usn.ubuntu.com/1991-1/","reference_id":"USN-1991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1991-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85727?format=json","purl":"pkg:ebuild/sys-libs/glibc@2.19-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"}],"aliases":["CVE-2013-4237"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yh8v-ebxn-z7dp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61768?format=json","vulnerability_id":"VCID-za5g-uj5p-5kd4","summary":"Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .","references":[{"reference_url":"http://osvdb.org/89747","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/89747"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0769.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0769.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1605.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-1605.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0242.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0242.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-0242","reference_id":"","reference_type":"","scores":[{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84299","published_at":"2026-05-16T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84044","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84057","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84073","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84098","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84105","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84122","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84116","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84112","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84134","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84136","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.8414","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84164","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.8417","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84175","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84196","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84221","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84237","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84235","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84253","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84285","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84295","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-0242"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242"},{"reference_url":"http://secunia.com/advisories/51951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51951"},{"reference_url":"http://secunia.com/advisories/55113","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/55113"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/81707","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/81707"},{"reference_url":"http://sourceware.org/bugzilla/show_bug.cgi?id=15078","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/bugzilla/show_bug.cgi?id=15078"},{"reference_url":"http://sourceware.org/ml/libc-alpha/2013-01/msg00967.html","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/ml/libc-alpha/2013-01/msg00967.html"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:163","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:163"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/01/30/5","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/01/30/5"},{"reference_url":"http://www.securityfocus.com/bid/57638","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/57638"},{"reference_url":"http://www.securitytracker.com/id/1028063","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1028063"},{"reference_url":"http://www.ubuntu.com/usn/USN-1991-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1991-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2014-0008.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2014-0008.html"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699399","reference_id":"699399","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699399"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=905874","reference_id":"905874","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=905874"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-0242","reference_id":"CVE-2013-0242","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-0242"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0769","reference_id":"RHSA-2013:0769","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0769"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1605","reference_id":"RHSA-2013:1605","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1605"},{"reference_url":"https://usn.ubuntu.com/1991-1/","reference_id":"USN-1991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1991-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85727?format=json","purl":"pkg:ebuild/sys-libs/glibc@2.19-r1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"}],"aliases":["CVE-2013-0242"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-za5g-uj5p-5kd4"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/sys-libs/glibc@2.19-r1"}