Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/922322?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/922322?format=api", "purl": "pkg:deb/debian/firejail@0.9.80-1?distro=trixie", "type": "deb", "namespace": "debian", "name": "firejail", "version": "0.9.80-1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92826?format=api", "vulnerability_id": "VCID-1tmc-qfze-57dv", "summary": "Firejail allows --chroot when seccomp is not supported, which might allow local users to gain privileges.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10123", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12738", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12693", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.126", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1285", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12947", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12995", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12797", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12876", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12926", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1289", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12853", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12808", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12712", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12717", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12819", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12837", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12799", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10123" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10123" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/01/05/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/01/05/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/01/06/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/01/06/2" }, { "reference_url": "https://security.archlinux.org/AVG-128", "reference_id": "AVG-128", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-128" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:firejail_project:firejail:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:firejail_project:firejail:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:firejail_project:firejail:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10123", "reference_id": "CVE-2016-10123", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10123" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922320?format=api", "purl": "pkg:deb/debian/firejail@0.9.38-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.38-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922321?format=api", "purl": "pkg:deb/debian/firejail@0.9.64.4-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.64.4-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922319?format=api", "purl": "pkg:deb/debian/firejail@0.9.72-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.72-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922323?format=api", "purl": "pkg:deb/debian/firejail@0.9.74-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.74-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922322?format=api", "purl": "pkg:deb/debian/firejail@0.9.80-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.80-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-10123" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1tmc-qfze-57dv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60403?format=api", "vulnerability_id": "VCID-3sy4-pu69-y7aa", "summary": "Multiple vulnerabilities have been discovered in Firejail, the\n worst of which may allow privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5206", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0241", "scoring_system": "epss", "scoring_elements": "0.85206", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0241", "scoring_system": "epss", "scoring_elements": "0.85161", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0241", "scoring_system": "epss", "scoring_elements": "0.85187", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0241", "scoring_system": "epss", "scoring_elements": "0.85021", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0241", "scoring_system": "epss", "scoring_elements": "0.85034", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0241", "scoring_system": "epss", "scoring_elements": "0.85051", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0241", "scoring_system": "epss", "scoring_elements": "0.85055", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0241", "scoring_system": "epss", "scoring_elements": "0.85078", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0241", "scoring_system": "epss", "scoring_elements": "0.85085", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0241", "scoring_system": "epss", "scoring_elements": "0.85101", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0241", "scoring_system": "epss", "scoring_elements": "0.85099", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0241", "scoring_system": "epss", "scoring_elements": "0.85096", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0241", "scoring_system": "epss", "scoring_elements": "0.85117", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0241", "scoring_system": "epss", "scoring_elements": "0.85119", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0241", "scoring_system": "epss", "scoring_elements": "0.8514", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0241", "scoring_system": "epss", "scoring_elements": "0.85149", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0241", "scoring_system": "epss", "scoring_elements": "0.85146", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5206" }, { "reference_url": "https://blog.lizzie.io/linux-containers-in-500-loc.html#fn.51", "reference_id": "", "reference_type": "", "scores": [], "url": "https://blog.lizzie.io/linux-containers-in-500-loc.html#fn.51" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5206" }, { "reference_url": "https://firejail.wordpress.com/download-2/release-notes/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://firejail.wordpress.com/download-2/release-notes/" }, { "reference_url": "https://github.com/netblue30/firejail/commit/6b8dba29d73257311564ee7f27b9b14758cc693e", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/netblue30/firejail/commit/6b8dba29d73257311564ee7f27b9b14758cc693e" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/01/07/5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/01/07/5" }, { "reference_url": "http://www.securityfocus.com/bid/97120", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/97120" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850558", "reference_id": "850558", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850558" }, { "reference_url": "https://security.archlinux.org/AVG-128", "reference_id": "AVG-128", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-128" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:firejail_project:firejail:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:firejail_project:firejail:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:firejail_project:firejail:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5206", "reference_id": "CVE-2017-5206", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "9.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5206" }, { "reference_url": "https://security.gentoo.org/glsa/201701-62", "reference_id": "GLSA-201701-62", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-62" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922327?format=api", "purl": "pkg:deb/debian/firejail@0.9.44.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.44.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922321?format=api", "purl": "pkg:deb/debian/firejail@0.9.64.4-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.64.4-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922319?format=api", "purl": "pkg:deb/debian/firejail@0.9.72-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.72-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922323?format=api", "purl": "pkg:deb/debian/firejail@0.9.74-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.74-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922322?format=api", "purl": "pkg:deb/debian/firejail@0.9.80-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.80-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-5206" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3sy4-pu69-y7aa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/37081?format=api", "vulnerability_id": "VCID-56sf-yfk6-1key", "summary": "A vulnerability was discovered in Firejail which may allow local\n attackers to gain root privileges.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26910", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15681", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.157", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15738", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15802", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15607", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15692", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15751", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15718", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15683", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15618", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15545", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15554", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15604", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15647", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15644", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15587", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15458", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15578", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26910" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26910", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26910" }, { "reference_url": "https://security.archlinux.org/ASA-202102-26", "reference_id": "ASA-202102-26", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-26" }, { "reference_url": "https://security.archlinux.org/AVG-1545", "reference_id": "AVG-1545", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1545" }, { "reference_url": "https://security.gentoo.org/glsa/202105-19", "reference_id": "GLSA-202105-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202105-19" }, { "reference_url": "https://usn.ubuntu.com/5141-1/", "reference_id": "USN-5141-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5141-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922331?format=api", "purl": "pkg:deb/debian/firejail@0.9.64.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.64.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922321?format=api", "purl": "pkg:deb/debian/firejail@0.9.64.4-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.64.4-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922319?format=api", "purl": "pkg:deb/debian/firejail@0.9.72-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.72-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922323?format=api", "purl": "pkg:deb/debian/firejail@0.9.74-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.74-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922322?format=api", "purl": "pkg:deb/debian/firejail@0.9.80-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.80-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-26910" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-56sf-yfk6-1key" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92820?format=api", "vulnerability_id": "VCID-6pv9-rkbr-p3bt", "summary": "Firejail does not restrict access to --tmpfs, which allows local users to gain privileges, as demonstrated by mounting over /etc.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10117", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12738", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12693", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.126", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1285", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12947", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12995", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12797", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12876", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12926", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1289", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12853", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12808", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12712", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12717", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12819", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12837", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12799", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10117" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10117", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10117" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/01/05/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/01/05/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/01/06/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/01/06/2" }, { "reference_url": "https://security.archlinux.org/AVG-128", "reference_id": "AVG-128", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-128" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:firejail_project:firejail:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:firejail_project:firejail:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:firejail_project:firejail:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10117", "reference_id": "CVE-2016-10117", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10117" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922320?format=api", "purl": "pkg:deb/debian/firejail@0.9.38-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.38-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922321?format=api", "purl": "pkg:deb/debian/firejail@0.9.64.4-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.64.4-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922319?format=api", "purl": "pkg:deb/debian/firejail@0.9.72-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.72-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922323?format=api", "purl": "pkg:deb/debian/firejail@0.9.74-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.74-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922322?format=api", "purl": "pkg:deb/debian/firejail@0.9.80-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.80-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-10117" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6pv9-rkbr-p3bt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60131?format=api", "vulnerability_id": "VCID-6vuy-7nnt-kqfm", "summary": "Firejail is vulnerable to the escalation of privileges due to an\n incomplete fix for CVE-2017-5180.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5940", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23395", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23558", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23595", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23376", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23449", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23499", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23517", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23478", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23424", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23441", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23435", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23416", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23233", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23221", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23211", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23098", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23183", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00079", "scoring_system": "epss", "scoring_elements": "0.23257", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5940" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5940", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5940" }, { "reference_url": "https://security.gentoo.org/glsa/201702-03", "reference_id": "GLSA-201702-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201702-03" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922328?format=api", "purl": "pkg:deb/debian/firejail@0.9.44.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.44.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922321?format=api", "purl": "pkg:deb/debian/firejail@0.9.64.4-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.64.4-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922319?format=api", "purl": "pkg:deb/debian/firejail@0.9.72-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.72-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922323?format=api", "purl": "pkg:deb/debian/firejail@0.9.74-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.74-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922322?format=api", "purl": "pkg:deb/debian/firejail@0.9.80-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.80-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-5940" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6vuy-7nnt-kqfm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92821?format=api", "vulnerability_id": "VCID-6vx7-d1nh-17fc", "summary": "Firejail allows local users to truncate /etc/resolv.conf via a chroot command to /.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10118", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13808", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13565", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13722", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13839", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13922", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13978", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13782", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13864", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13917", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13874", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13838", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.1379", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13698", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13693", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13765", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13787", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13755", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13672", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10118" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10118", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10118" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/01/05/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/01/05/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/01/06/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/01/06/2" }, { "reference_url": "https://security.archlinux.org/AVG-128", "reference_id": "AVG-128", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-128" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:firejail_project:firejail:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:firejail_project:firejail:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:firejail_project:firejail:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10118", "reference_id": "CVE-2016-10118", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:P/A:N" }, { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10118" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922324?format=api", "purl": "pkg:deb/debian/firejail@0.9.44.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.44.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922321?format=api", "purl": "pkg:deb/debian/firejail@0.9.64.4-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.64.4-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922319?format=api", "purl": "pkg:deb/debian/firejail@0.9.72-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.72-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922323?format=api", "purl": "pkg:deb/debian/firejail@0.9.74-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.74-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922322?format=api", "purl": "pkg:deb/debian/firejail@0.9.80-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.80-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-10118" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6vx7-d1nh-17fc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42598?format=api", "vulnerability_id": "VCID-9auq-b7rs-5fe2", "summary": "A vulnerability has been discovered in Firejail which could result in local root privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31214", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21703", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.2176", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21509", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21585", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21644", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21656", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21618", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21561", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21558", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21566", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21536", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21389", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21387", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21372", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21306", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21374", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21461", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-31214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31214" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012510", "reference_id": "1012510", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1012510" }, { "reference_url": "https://security.gentoo.org/glsa/202305-19", "reference_id": "GLSA-202305-19", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202305-19" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922321?format=api", "purl": "pkg:deb/debian/firejail@0.9.64.4-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.64.4-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922332?format=api", "purl": "pkg:deb/debian/firejail@0.9.68-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.68-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922319?format=api", "purl": "pkg:deb/debian/firejail@0.9.72-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.72-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922323?format=api", "purl": "pkg:deb/debian/firejail@0.9.74-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.74-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922322?format=api", "purl": "pkg:deb/debian/firejail@0.9.80-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.80-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-31214" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9auq-b7rs-5fe2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60404?format=api", "vulnerability_id": "VCID-9cxj-26s4-8ued", "summary": "Multiple vulnerabilities have been discovered in Firejail, the\n worst of which may allow privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5207", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10965", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.1076", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10893", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10862", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11001", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11063", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10886", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10962", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11016", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11019", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10987", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10964", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10828", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10842", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10961", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10915", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10874", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10816", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5207" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5207" }, { "reference_url": "https://firejail.wordpress.com/download-2/release-notes/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://firejail.wordpress.com/download-2/release-notes/" }, { "reference_url": "https://github.com/netblue30/firejail/commit/5d43fdcd215203868d440ffc42036f5f5ffc89fc", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/netblue30/firejail/commit/5d43fdcd215203868d440ffc42036f5f5ffc89fc" }, { "reference_url": "https://github.com/netblue30/firejail/issues/1023", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/netblue30/firejail/issues/1023" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/01/07/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/01/07/6" }, { "reference_url": "http://www.securityfocus.com/bid/97385", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/97385" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850528", "reference_id": "850528", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850528" }, { "reference_url": "https://security.archlinux.org/AVG-128", "reference_id": "AVG-128", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-128" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:firejail_project:firejail:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:firejail_project:firejail:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:firejail_project:firejail:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5207", "reference_id": "CVE-2017-5207", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5207" }, { "reference_url": "https://security.gentoo.org/glsa/201701-62", "reference_id": "GLSA-201701-62", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-62" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922327?format=api", "purl": "pkg:deb/debian/firejail@0.9.44.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.44.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922321?format=api", "purl": "pkg:deb/debian/firejail@0.9.64.4-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.64.4-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922319?format=api", "purl": "pkg:deb/debian/firejail@0.9.72-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.72-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922323?format=api", "purl": "pkg:deb/debian/firejail@0.9.74-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.74-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922322?format=api", "purl": "pkg:deb/debian/firejail@0.9.80-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.80-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-5207" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9cxj-26s4-8ued" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92823?format=api", "vulnerability_id": "VCID-9znp-wf6k-n3ab", "summary": "Firejail uses 0777 permissions when mounting (1) /dev, (2) /dev/shm, (3) /var/tmp, or (4) /var/lock, which allows local users to gain privileges.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10120", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09308", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09069", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09232", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09117", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09122", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09174", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09098", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09178", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09208", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0921", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0918", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09165", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0906", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0904", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09197", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09243", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09187", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09161", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10120" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10120", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10120" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/01/05/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/01/05/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/01/06/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/01/06/2" }, { "reference_url": "https://security.archlinux.org/AVG-128", "reference_id": "AVG-128", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-128" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:firejail_project:firejail:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:firejail_project:firejail:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:firejail_project:firejail:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10120", "reference_id": "CVE-2016-10120", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10120" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922320?format=api", "purl": "pkg:deb/debian/firejail@0.9.38-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.38-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922321?format=api", "purl": "pkg:deb/debian/firejail@0.9.64.4-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.64.4-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922319?format=api", "purl": "pkg:deb/debian/firejail@0.9.72-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.72-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922323?format=api", "purl": "pkg:deb/debian/firejail@0.9.74-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.74-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922322?format=api", "purl": "pkg:deb/debian/firejail@0.9.80-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.80-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-10120" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9znp-wf6k-n3ab" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92822?format=api", "vulnerability_id": "VCID-bj2m-xrat-13fp", "summary": "Firejail uses 0777 permissions when mounting /tmp, which allows local users to gain privileges.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10119", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09308", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09069", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09232", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09117", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09122", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09174", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09098", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09178", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09208", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0921", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0918", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09165", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0906", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0904", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09197", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09243", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09187", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09161", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10119" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10119", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10119" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/01/05/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/01/05/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/01/06/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/01/06/2" }, { "reference_url": "https://security.archlinux.org/AVG-128", "reference_id": "AVG-128", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-128" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:firejail_project:firejail:-:*:*:*:*:wordpress:*:*", "reference_id": "cpe:2.3:a:firejail_project:firejail:-:*:*:*:*:wordpress:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:firejail_project:firejail:-:*:*:*:*:wordpress:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10119", "reference_id": "CVE-2016-10119", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10119" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922320?format=api", "purl": "pkg:deb/debian/firejail@0.9.38-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.38-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922321?format=api", "purl": "pkg:deb/debian/firejail@0.9.64.4-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.64.4-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922319?format=api", "purl": "pkg:deb/debian/firejail@0.9.72-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.72-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922323?format=api", "purl": "pkg:deb/debian/firejail@0.9.74-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.74-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922322?format=api", "purl": "pkg:deb/debian/firejail@0.9.80-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.80-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-10119" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bj2m-xrat-13fp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56585?format=api", "vulnerability_id": "VCID-eud3-k24q-6ber", "summary": "Multiple vulnerabilities have been found in Firejail, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-17368", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0449", "scoring_system": "epss", "scoring_elements": "0.89064", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0449", "scoring_system": "epss", "scoring_elements": "0.89073", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0449", "scoring_system": "epss", "scoring_elements": "0.89088", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0449", "scoring_system": "epss", "scoring_elements": "0.8909", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0449", "scoring_system": "epss", "scoring_elements": "0.89108", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0449", "scoring_system": "epss", "scoring_elements": "0.89113", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0449", "scoring_system": "epss", "scoring_elements": "0.89124", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0449", "scoring_system": "epss", "scoring_elements": "0.8912", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0449", "scoring_system": "epss", "scoring_elements": "0.89118", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0449", "scoring_system": "epss", "scoring_elements": "0.89132", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0449", "scoring_system": "epss", "scoring_elements": "0.89128", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0449", "scoring_system": "epss", "scoring_elements": "0.89146", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0449", "scoring_system": "epss", "scoring_elements": "0.89152", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0449", "scoring_system": "epss", "scoring_elements": "0.89157", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0449", "scoring_system": "epss", "scoring_elements": "0.89164", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0449", "scoring_system": "epss", "scoring_elements": "0.89181", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0449", "scoring_system": "epss", "scoring_elements": "0.89192", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-17368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15005", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15005" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17367", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17367" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25813", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25813" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25828", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25828" }, { "reference_url": "https://security.gentoo.org/glsa/202101-02", "reference_id": "GLSA-202101-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922330?format=api", "purl": "pkg:deb/debian/firejail@0.9.62-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.62-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922321?format=api", "purl": "pkg:deb/debian/firejail@0.9.64.4-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.64.4-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922319?format=api", "purl": "pkg:deb/debian/firejail@0.9.72-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.72-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922323?format=api", "purl": "pkg:deb/debian/firejail@0.9.74-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.74-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922322?format=api", "purl": "pkg:deb/debian/firejail@0.9.80-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.80-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2020-17368" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eud3-k24q-6ber" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60402?format=api", "vulnerability_id": "VCID-hfbg-ybsx-9ba4", "summary": "Multiple vulnerabilities have been discovered in Firejail, the\n worst of which may allow privilege escalation.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5180", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26719", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27039", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27079", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27115", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26905", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26974", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27019", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27023", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26978", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26921", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26931", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26906", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.2687", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26821", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26814", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26748", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26602", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.2667", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5180" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5180", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5180" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850160", "reference_id": "850160", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850160" }, { "reference_url": "https://security.archlinux.org/AVG-128", "reference_id": "AVG-128", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-128" }, { "reference_url": "http://seclists.org/oss-sec/2017/q1/20", "reference_id": "CVE-2017-5180", "reference_type": "exploit", "scores": [], "url": "http://seclists.org/oss-sec/2017/q1/20" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43359.c", "reference_id": "CVE-2017-5180", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43359.c" }, { "reference_url": "https://security.gentoo.org/glsa/201701-62", "reference_id": "GLSA-201701-62", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-62" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922326?format=api", "purl": "pkg:deb/debian/firejail@0.9.44.2-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.44.2-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922321?format=api", "purl": "pkg:deb/debian/firejail@0.9.64.4-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.64.4-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922319?format=api", "purl": "pkg:deb/debian/firejail@0.9.72-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.72-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922323?format=api", "purl": "pkg:deb/debian/firejail@0.9.74-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.74-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922322?format=api", "purl": "pkg:deb/debian/firejail@0.9.80-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.80-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-5180" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hfbg-ybsx-9ba4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93944?format=api", "vulnerability_id": "VCID-j4ay-sffd-zbat", "summary": "Firejail before 0.9.60 allows truncation (resizing to length 0) of the firejail binary on the host by running exploit code inside a firejail sandbox and having the sandbox terminated. To succeed, certain conditions need to be fulfilled: The jail (with the exploit code inside) needs to be started as root, and it also needs to be terminated as root from the host (either by stopping it ungracefully (e.g., SIGKILL), or by using the --shutdown control command). This is similar to CVE-2019-5736.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12499", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01291", "scoring_system": "epss", "scoring_elements": "0.79761", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01291", "scoring_system": "epss", "scoring_elements": "0.79785", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01291", "scoring_system": "epss", "scoring_elements": "0.79802", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.79985", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.80014", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.80022", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.80042", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.80026", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.79966", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.80046", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.80048", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.80075", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.8008", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.80096", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.80018", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.79973", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01341", "scoring_system": "epss", "scoring_elements": "0.79995", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12499" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12499", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12499" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929733", "reference_id": "929733", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929733" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922329?format=api", "purl": "pkg:deb/debian/firejail@0.9.58.2-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.58.2-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922321?format=api", "purl": "pkg:deb/debian/firejail@0.9.64.4-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.64.4-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922319?format=api", "purl": "pkg:deb/debian/firejail@0.9.72-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.72-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922323?format=api", "purl": "pkg:deb/debian/firejail@0.9.74-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.74-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922322?format=api", "purl": "pkg:deb/debian/firejail@0.9.80-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.80-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-12499" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j4ay-sffd-zbat" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92825?format=api", "vulnerability_id": "VCID-rdab-wjwh-f7h3", "summary": "Firejail does not properly clean environment variables, which allows local users to gain privileges.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10122", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12738", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12693", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.126", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1285", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12947", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12995", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12797", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12876", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12926", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.1289", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12853", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12808", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12712", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12717", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12819", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12837", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12799", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10122" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10122", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10122" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/01/05/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/01/05/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/01/06/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/01/06/2" }, { "reference_url": "https://security.archlinux.org/AVG-128", "reference_id": "AVG-128", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-128" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:firejail_project:firejail:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:firejail_project:firejail:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:firejail_project:firejail:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10122", "reference_id": "CVE-2016-10122", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10122" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922324?format=api", "purl": "pkg:deb/debian/firejail@0.9.44.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.44.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922321?format=api", "purl": "pkg:deb/debian/firejail@0.9.64.4-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.64.4-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922319?format=api", "purl": "pkg:deb/debian/firejail@0.9.72-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.72-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922323?format=api", "purl": "pkg:deb/debian/firejail@0.9.74-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.74-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922322?format=api", "purl": "pkg:deb/debian/firejail@0.9.80-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.80-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-10122" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rdab-wjwh-f7h3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56584?format=api", "vulnerability_id": "VCID-uzv4-9xtx-ryhr", "summary": "Multiple vulnerabilities have been found in Firejail, the worst of\n which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-17367", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33197", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33324", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33356", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33189", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33232", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33265", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.3327", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33229", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33206", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33246", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33223", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33186", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.3304", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33023", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.32947", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.32834", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.32903", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.32943", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-17367" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15005", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15005" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17367", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17367" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25812", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25812" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25813", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25813" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25814", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25814" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25827", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25827" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25828", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25828" }, { "reference_url": "https://security.gentoo.org/glsa/202101-02", "reference_id": "GLSA-202101-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202101-02" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922330?format=api", "purl": "pkg:deb/debian/firejail@0.9.62-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.62-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922321?format=api", "purl": "pkg:deb/debian/firejail@0.9.64.4-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.64.4-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922319?format=api", "purl": "pkg:deb/debian/firejail@0.9.72-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.72-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922323?format=api", "purl": "pkg:deb/debian/firejail@0.9.74-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.74-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922322?format=api", "purl": "pkg:deb/debian/firejail@0.9.80-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.80-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2020-17367" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uzv4-9xtx-ryhr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92824?format=api", "vulnerability_id": "VCID-wbrw-7ztk-qkdt", "summary": "Firejail uses weak permissions for /dev/shm/firejail and possibly other files, which allows local users to gain privileges.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10121", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09308", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09069", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09232", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09117", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09122", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09174", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09098", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09178", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09208", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0921", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0918", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09165", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0906", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0904", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09197", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09243", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09187", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09161", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-10121" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10121", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10121" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/01/05/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/01/05/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/01/06/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/01/06/2" }, { "reference_url": "https://security.archlinux.org/AVG-128", "reference_id": "AVG-128", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-128" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:firejail_project:firejail:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:firejail_project:firejail:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:firejail_project:firejail:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10121", "reference_id": "CVE-2016-10121", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10121" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922320?format=api", "purl": "pkg:deb/debian/firejail@0.9.38-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.38-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922321?format=api", "purl": "pkg:deb/debian/firejail@0.9.64.4-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.64.4-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922319?format=api", "purl": "pkg:deb/debian/firejail@0.9.72-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.72-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922323?format=api", "purl": "pkg:deb/debian/firejail@0.9.74-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.74-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922322?format=api", "purl": "pkg:deb/debian/firejail@0.9.80-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.80-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-10121" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wbrw-7ztk-qkdt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93945?format=api", "vulnerability_id": "VCID-wr4q-yy27-7qar", "summary": "In Firejail before 0.9.60, seccomp filters are writable inside the jail, leading to a lack of intended seccomp restrictions for a process that is joined to the jail after a filter has been modified by an attacker.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12589", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22273", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22357", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22435", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23155", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23227", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23278", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.233", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23262", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23204", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23144", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23213", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23174", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.22999", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.22992", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.22988", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23221", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23323", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00078", "scoring_system": "epss", "scoring_elements": "0.23366", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12589" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12589", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12589" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929732", "reference_id": "929732", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929732" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922329?format=api", "purl": "pkg:deb/debian/firejail@0.9.58.2-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.58.2-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922321?format=api", "purl": "pkg:deb/debian/firejail@0.9.64.4-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.64.4-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922319?format=api", "purl": "pkg:deb/debian/firejail@0.9.72-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.72-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922323?format=api", "purl": "pkg:deb/debian/firejail@0.9.74-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.74-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922322?format=api", "purl": "pkg:deb/debian/firejail@0.9.80-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.80-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-12589" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wr4q-yy27-7qar" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92991?format=api", "vulnerability_id": "VCID-y6zs-d5zx-g3cq", "summary": "Firejail 0.9.38.4 allows local users to execute arbitrary commands outside of the sandbox via a crafted TIOCSTI ioctl call.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9016", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33368", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33506", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33539", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33379", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33424", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33458", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33462", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33421", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33397", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33433", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33408", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33377", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33221", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33204", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33125", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33011", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.3308", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00136", "scoring_system": "epss", "scoring_elements": "0.33118", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9016" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9016", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9016" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922325?format=api", "purl": "pkg:deb/debian/firejail@0.9.44-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.44-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922321?format=api", "purl": "pkg:deb/debian/firejail@0.9.64.4-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.64.4-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922319?format=api", "purl": "pkg:deb/debian/firejail@0.9.72-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.72-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922323?format=api", "purl": "pkg:deb/debian/firejail@0.9.74-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.74-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922322?format=api", "purl": "pkg:deb/debian/firejail@0.9.80-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.80-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-9016" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y6zs-d5zx-g3cq" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/firejail@0.9.80-1%3Fdistro=trixie" }