{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","type":"deb","namespace":"debian","name":"glibc","version":"2.36-9+deb12u13","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"2.37-9","latest_non_vulnerable_version":"2.42-15","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64138?format=json","vulnerability_id":"VCID-3e43-r92j-hkd3","summary":"glibc: glibc: Incorrect DNS response parsing via crafted DNS server response","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4437.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4437.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-4437","reference_id":"","reference_type":"","scores":[{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14208","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14246","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.143","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14151","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14042","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14041","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15496","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15552","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15514","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15551","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16379","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16517","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16579","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20709","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-4437"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4437","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4437"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1131435","reference_id":"1131435","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1131435"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2449777","reference_id":"2449777","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2449777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7316","reference_id":"RHSA-2026:7316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7316"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=34014","reference_id":"show_bug.cgi?id=34014","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-23T15:10:34Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=34014"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2026-4437"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3e43-r92j-hkd3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64137?format=json","vulnerability_id":"VCID-nwfb-xnks-1kg7","summary":"glibc: glibc: Invalid DNS hostname returned via gethostbyaddr functions","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4438.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4438.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-4438","reference_id":"","reference_type":"","scores":[{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07359","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07331","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08485","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08511","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08566","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08753","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08731","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08716","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08605","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08593","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09736","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09694","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09727","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00033","scoring_system":"epss","scoring_elements":"0.09769","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13626","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-4438"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4438","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4438"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1131887","reference_id":"1131887","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1131887"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2449783","reference_id":"2449783","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2449783"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7316","reference_id":"RHSA-2026:7316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7316"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=34015","reference_id":"show_bug.cgi?id=34015","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-23T15:06:13Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=34015"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2026-4438"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nwfb-xnks-1kg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64957?format=json","vulnerability_id":"VCID-ssnc-wdcf-sfc9","summary":"glibc: wordexp with WRDE_REUSE and WRDE_APPEND may return uninitialized memory","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-15281.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-15281.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-15281","reference_id":"","reference_type":"","scores":[{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21392","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.20978","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21102","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21104","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.2108","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21446","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21197","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21277","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21339","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21349","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21307","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21253","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21246","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21256","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21233","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-15281"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15281","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15281"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126266","reference_id":"1126266","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126266"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2431196","reference_id":"2431196","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2431196"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2786","reference_id":"RHSA-2026:2786","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2786"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3228","reference_id":"RHSA-2026:3228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4501","reference_id":"RHSA-2026:4501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4655","reference_id":"RHSA-2026:4655","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4655"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4772","reference_id":"RHSA-2026:4772","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4772"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4943","reference_id":"RHSA-2026:4943","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4943"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5606","reference_id":"RHSA-2026:5606","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5606"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7316","reference_id":"RHSA-2026:7316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7316"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33814","reference_id":"show_bug.cgi?id=33814","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-22T19:21:34Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33814"},{"reference_url":"https://usn.ubuntu.com/8005-1/","reference_id":"USN-8005-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8005-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923509?format=json","purl":"pkg:deb/debian/glibc@2.42-11?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2025-15281"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ssnc-wdcf-sfc9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64994?format=json","vulnerability_id":"VCID-tcpv-4crc-zuap","summary":"glibc: glibc: Information disclosure via zero-valued network query","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0915.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0915.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-0915","reference_id":"","reference_type":"","scores":[{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05581","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05848","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05792","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05829","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05837","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05618","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05616","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05655","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05681","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05653","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05645","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05638","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05592","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.05605","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00021","scoring_system":"epss","scoring_elements":"0.0576","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-0915"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125748","reference_id":"1125748","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125748"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2430201","reference_id":"2430201","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2430201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1334","reference_id":"RHSA-2026:1334","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1334"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2786","reference_id":"RHSA-2026:2786","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2786"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3228","reference_id":"RHSA-2026:3228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4501","reference_id":"RHSA-2026:4501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4655","reference_id":"RHSA-2026:4655","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4655"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4772","reference_id":"RHSA-2026:4772","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4772"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4943","reference_id":"RHSA-2026:4943","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4943"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5606","reference_id":"RHSA-2026:5606","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5606"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7316","reference_id":"RHSA-2026:7316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7316"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33802","reference_id":"show_bug.cgi?id=33802","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-20T16:03:19Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33802"},{"reference_url":"https://usn.ubuntu.com/8005-1/","reference_id":"USN-8005-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8005-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923515?format=json","purl":"pkg:deb/debian/glibc@2.42-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2026-0915"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tcpv-4crc-zuap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63927?format=json","vulnerability_id":"VCID-us68-psx5-zude","summary":"glibc: glibc: Denial of Service via iconv() function with specific character sets","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4046.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4046.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-4046","reference_id":"","reference_type":"","scores":[{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12268","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12223","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13343","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13337","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13316","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13212","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.143","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14246","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14208","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14151","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14042","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14041","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14474","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16379","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-4046"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4046","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4046"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132499","reference_id":"1132499","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132499"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453117","reference_id":"2453117","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453117"},{"reference_url":"https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0007;hb=HEAD","reference_id":"GLIBC-SA-2026-0007;hb=HEAD","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-30T17:33:59Z/"}],"url":"https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0007;hb=HEAD"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:12740","reference_id":"RHSA-2026:12740","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:12740"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33980","reference_id":"show_bug.cgi?id=33980","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-30T17:33:59Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33980"},{"reference_url":"https://inbox.sourceware.org/libc-announce/76814edf-cf7f-47ec-979d-2dce0a2c76bf@gotplt.org/T/#u","reference_id":"#u","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-30T17:33:59Z/"}],"url":"https://inbox.sourceware.org/libc-announce/76814edf-cf7f-47ec-979d-2dce0a2c76bf@gotplt.org/T/#u"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2026-4046"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-us68-psx5-zude"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65000?format=json","vulnerability_id":"VCID-zn6t-3mvb-wufm","summary":"glibc: Integer overflow in memalign leads to heap corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0861.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0861.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-0861","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.0115","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01232","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01152","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01156","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01144","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01226","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.0123","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01237","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01231","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01157","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01166","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01172","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01173","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01159","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-0861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125678","reference_id":"1125678","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125678"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2429771","reference_id":"2429771","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2429771"},{"reference_url":"https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0001","reference_id":"GLIBC-SA-2026-0001","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-29T03:55:55Z/"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-14T21:24:01Z/"}],"url":"https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1334","reference_id":"RHSA-2026:1334","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:1334"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2786","reference_id":"RHSA-2026:2786","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:2786"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3228","reference_id":"RHSA-2026:3228","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:3228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4501","reference_id":"RHSA-2026:4501","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4501"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4655","reference_id":"RHSA-2026:4655","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4655"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4943","reference_id":"RHSA-2026:4943","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:4943"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:5606","reference_id":"RHSA-2026:5606","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:5606"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7316","reference_id":"RHSA-2026:7316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7316"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33796","reference_id":"show_bug.cgi?id=33796","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-29T03:55:55Z/"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2026-01-14T21:24:01Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33796"},{"reference_url":"https://usn.ubuntu.com/8005-1/","reference_id":"USN-8005-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8005-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923515?format=json","purl":"pkg:deb/debian/glibc@2.42-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2026-0861"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zn6t-3mvb-wufm"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43777?format=json","vulnerability_id":"VCID-13gq-1x22-skhy","summary":"Multiple vulnerabilities in glibc could result in Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27618.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27618.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27618","reference_id":"","reference_type":"","scores":[{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1686","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16567","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17028","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17082","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16863","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16952","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1701","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16985","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16939","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16881","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16817","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16819","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16849","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16753","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16736","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16701","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-27618"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27618"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1893708","reference_id":"1893708","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1893708"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973914","reference_id":"973914","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=973914"},{"reference_url":"https://security.archlinux.org/ASA-202102-16","reference_id":"ASA-202102-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202102-16"},{"reference_url":"https://security.archlinux.org/ASA-202102-17","reference_id":"ASA-202102-17","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202102-17"},{"reference_url":"https://security.archlinux.org/AVG-1320","reference_id":"AVG-1320","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1320"},{"reference_url":"https://security.gentoo.org/glsa/202107-07","reference_id":"GLSA-202107-07","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:14:58Z/"}],"url":"https://security.gentoo.org/glsa/202107-07"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210401-0006/","reference_id":"ntap-20210401-0006","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:14:58Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210401-0006/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1585","reference_id":"RHSA-2021:1585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1585"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21","reference_id":"show_bug.cgi?id=19519#c21","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:14:58Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=26224","reference_id":"show_bug.cgi?id=26224","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:14:58Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=26224"},{"reference_url":"https://usn.ubuntu.com/5310-1/","reference_id":"USN-5310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-1/"},{"reference_url":"https://usn.ubuntu.com/5768-1/","reference_id":"USN-5768-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5768-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923480?format=json","purl":"pkg:deb/debian/glibc@2.31-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2020-27618"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-13gq-1x22-skhy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54361?format=json","vulnerability_id":"VCID-1971-5hzf-43dt","summary":"security update","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00012.html"},{"reference_url":"http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html"},{"reference_url":"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4043.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4043.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4043","reference_id":"","reference_type":"","scores":[{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.82051","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81888","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81899","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81922","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81918","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81945","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81952","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81972","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81961","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81956","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81991","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.81993","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.82016","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.82027","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01643","scoring_system":"epss","scoring_elements":"0.82032","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jun/18","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jun/18"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Sep/7","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Sep/7"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/93784","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/93784"},{"reference_url":"https://seclists.org/bugtraq/2019/Jun/14","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jun/14"},{"reference_url":"https://seclists.org/bugtraq/2019/Sep/7","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Sep/7"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=17048","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=17048"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=ChangeLog%3Bh=3020b9ac232315df362521aeaf85f21cb9926db8%3Bhp=d86e73963dd9fb5e21b1a28326630337226812aa%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=ChangeLog%3Bh=3020b9ac232315df362521aeaf85f21cb9926db8%3Bhp=d86e73963dd9fb5e21b1a28326630337226812aa%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=posix/spawn_faction_addopen.c%3Bh=40800b8e6e81341501c0fb8a91009529e2048dec%3Bhp=47f62425b696a4fdd511b2a057746322eb6518db%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=blobdiff%3Bf=posix/spawn_faction_addopen.c%3Bh=40800b8e6e81341501c0fb8a91009529e2048dec%3Bhp=47f62425b696a4fdd511b2a057746322eb6518db%3Bhb=89e435f3559c53084498e9baad22172b64429362%3Bhpb=c3a2ebe1f7541cc35937621e08c28ff88afd0845"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=89e435f3559c53084498e9baad22172b64429362","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=89e435f3559c53084498e9baad22172b64429362"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:152","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:152"},{"reference_url":"http://www.securityfocus.com/bid/68006","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/68006"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1109263","reference_id":"1109263","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1109263"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751774","reference_id":"751774","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751774"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4043","reference_id":"CVE-2014-4043","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4043"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://usn.ubuntu.com/2306-1/","reference_id":"USN-2306-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2306-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923448?format=json","purl":"pkg:deb/debian/glibc@2.19-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2014-4043"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1971-5hzf-43dt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61763?format=json","vulnerability_id":"VCID-22vv-9xn4-vyap","summary":"Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3404.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3404.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3404","reference_id":"","reference_type":"","scores":[{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.6952","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69531","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69546","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69525","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69575","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69592","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69614","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69599","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69585","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69624","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69633","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69666","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69675","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.6968","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69655","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3404"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3404","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3404"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681473","reference_id":"681473","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681473"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=833703","reference_id":"833703","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=833703"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1098","reference_id":"RHSA-2012:1098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1200","reference_id":"RHSA-2012:1200","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1200"},{"reference_url":"https://usn.ubuntu.com/1589-1/","reference_id":"USN-1589-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1589-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923436?format=json","purl":"pkg:deb/debian/glibc@2.13-35?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.13-35%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2012-3404"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-22vv-9xn4-vyap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62168?format=json","vulnerability_id":"VCID-2gmq-64e3-c7db","summary":"Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23218.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23218.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23218","reference_id":"","reference_type":"","scores":[{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59398","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59469","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.5946","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59476","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59439","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59453","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59433","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65815","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65785","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66885","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66886","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66912","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66934","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66947","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66967","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23218"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23218"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2042013","reference_id":"2042013","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2042013"},{"reference_url":"https://security.gentoo.org/glsa/202208-24","reference_id":"GLSA-202208-24","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:43Z/"}],"url":"https://security.gentoo.org/glsa/202208-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0896","reference_id":"RHSA-2022:0896","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0896"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=28768","reference_id":"show_bug.cgi?id=28768","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:43Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=28768"},{"reference_url":"https://usn.ubuntu.com/5310-1/","reference_id":"USN-5310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-1/"},{"reference_url":"https://usn.ubuntu.com/5310-2/","reference_id":"USN-5310-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923485?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923490?format=json","purl":"pkg:deb/debian/glibc@2.33-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.33-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2022-23218"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2gmq-64e3-c7db"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54360?format=json","vulnerability_id":"VCID-2pd1-hkrf-j7e5","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7424.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7424.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7424","reference_id":"","reference_type":"","scores":[{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74501","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74505","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74532","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74506","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74538","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74554","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74576","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74557","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74549","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74587","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74594","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74586","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74622","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74627","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74629","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00831","scoring_system":"epss","scoring_elements":"0.74631","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7424"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1186614","reference_id":"1186614","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1186614"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1391","reference_id":"RHSA-2014:1391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1391"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:1627","reference_id":"RHSA-2015:1627","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:1627"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923446?format=json","purl":"pkg:deb/debian/glibc@2.15-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.15-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2013-7424"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2pd1-hkrf-j7e5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87523?format=json","vulnerability_id":"VCID-2tet-rxt9-n3ac","summary":"glibc: scanf implementation crashes on certain inputs","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-5320.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-5320.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-5320","reference_id":"","reference_type":"","scores":[{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.1844","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18566","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18814","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18952","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.19005","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18728","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18808","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18859","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18863","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18816","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18763","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18715","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18727","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18744","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18631","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.1861","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-5320"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5320","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5320"},{"reference_url":"https://marc.info/?l=gimp-developer&m=129567990905823&w=2","reference_id":"","reference_type":"","scores":[],"url":"https://marc.info/?l=gimp-developer&m=129567990905823&w=2"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=13138#c4","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=13138#c4"},{"reference_url":"https://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=20b38e0","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=20b38e0"},{"reference_url":"https://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=3f8cc204fdd0","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=3f8cc204fdd0"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/03/12/14","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/03/12/14"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1196745","reference_id":"1196745","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1196745"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-5320","reference_id":"CVE-2011-5320","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-5320"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923435?format=json","purl":"pkg:deb/debian/glibc@2.15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.15%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2011-5320"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2tet-rxt9-n3ac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61185?format=json","vulnerability_id":"VCID-2tgj-syh1-pqaj","summary":"Multiple vulnerabilities have been found in the GNU C Library, the\n    worst of which allows context-dependent attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html"},{"reference_url":"http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html"},{"reference_url":"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0680.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2017-0680.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9761.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9761.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9761","reference_id":"","reference_type":"","scores":[{"value":"0.03577","scoring_system":"epss","scoring_elements":"0.87771","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03577","scoring_system":"epss","scoring_elements":"0.87785","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03577","scoring_system":"epss","scoring_elements":"0.87751","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03577","scoring_system":"epss","scoring_elements":"0.8775","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03577","scoring_system":"epss","scoring_elements":"0.87767","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03577","scoring_system":"epss","scoring_elements":"0.87773","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03823","scoring_system":"epss","scoring_elements":"0.88143","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03823","scoring_system":"epss","scoring_elements":"0.88078","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03823","scoring_system":"epss","scoring_elements":"0.88136","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03823","scoring_system":"epss","scoring_elements":"0.8815","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03823","scoring_system":"epss","scoring_elements":"0.88135","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03823","scoring_system":"epss","scoring_elements":"0.88087","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03823","scoring_system":"epss","scoring_elements":"0.88103","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03823","scoring_system":"epss","scoring_elements":"0.88108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03823","scoring_system":"epss","scoring_elements":"0.88127","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03823","scoring_system":"epss","scoring_elements":"0.88133","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9761"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jun/18","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jun/18"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Sep/7","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Sep/7"},{"reference_url":"https://seclists.org/bugtraq/2019/Jun/14","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jun/14"},{"reference_url":"https://seclists.org/bugtraq/2019/Sep/7","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Sep/7"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=16962","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=16962"},{"reference_url":"https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/19/11","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/19/11"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/20/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/20/1"},{"reference_url":"http://www.securityfocus.com/bid/83306","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/83306"},{"reference_url":"http://www.ubuntu.com/usn/USN-2985-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2985-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2985-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2985-2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300310","reference_id":"1300310","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300310"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813187","reference_id":"813187","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813187"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9761","reference_id":"CVE-2014-9761","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9761"},{"reference_url":"https://security.gentoo.org/glsa/201702-11","reference_id":"GLSA-201702-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201702-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0680","reference_id":"RHSA-2017:0680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1916","reference_id":"RHSA-2017:1916","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1916"},{"reference_url":"https://usn.ubuntu.com/2985-1/","reference_id":"USN-2985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2985-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923451?format=json","purl":"pkg:deb/debian/glibc@2.23-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2014-9761"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2tgj-syh1-pqaj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43040?format=json","vulnerability_id":"VCID-3hqs-jns2-puf2","summary":"Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33599.json","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33599.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33599","reference_id":"","reference_type":"","scores":[{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70094","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70102","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70116","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70141","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70157","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.7018","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70165","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70153","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70196","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70205","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00846","scoring_system":"epss","scoring_elements":"0.74906","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0087","scoring_system":"epss","scoring_elements":"0.7526","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0087","scoring_system":"epss","scoring_elements":"0.75256","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0087","scoring_system":"epss","scoring_elements":"0.75216","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0087","scoring_system":"epss","scoring_elements":"0.75253","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277202","reference_id":"2277202","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277202"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/07/22/5","reference_id":"5","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/07/22/5"},{"reference_url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005","reference_id":"GLIBC-SA-2024-0005","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/"}],"url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005"},{"reference_url":"https://security.gentoo.org/glsa/202405-17","reference_id":"GLSA-202405-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-17"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html","reference_id":"msg00026.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240524-0011/","reference_id":"ntap-20240524-0011","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240524-0011/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2799","reference_id":"RHSA-2024:2799","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2799"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3309","reference_id":"RHSA-2024:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3312","reference_id":"RHSA-2024:3312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3339","reference_id":"RHSA-2024:3339","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3339"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3344","reference_id":"RHSA-2024:3344","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3411","reference_id":"RHSA-2024:3411","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3411"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3423","reference_id":"RHSA-2024:3423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3464","reference_id":"RHSA-2024:3464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3588","reference_id":"RHSA-2024:3588","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4126","reference_id":"RHSA-2024:4126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4126"},{"reference_url":"https://usn.ubuntu.com/6804-1/","reference_id":"USN-6804-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6804-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923504?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923503?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923505?format=json","purl":"pkg:deb/debian/glibc@2.37-19?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.37-19%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2024-33599"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3hqs-jns2-puf2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88009?format=json","vulnerability_id":"VCID-3yq4-pzqz-4yap","summary":"glibc: ldd unexpected code execution issue","references":[{"reference_url":"http://openwall.com/lists/oss-security/2011/03/07/10","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/07/10"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/07/13","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/07/13"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/07/7","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/07/7"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/08/1","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/08/1"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/08/10","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/08/10"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/08/2","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/08/2"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/08/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/08/3"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/08/7","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/08/7"},{"reference_url":"http://reverse.lostrealm.com/protect/ldd.html","reference_id":"","reference_type":"","scores":[],"url":"http://reverse.lostrealm.com/protect/ldd.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-5064.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-5064.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-5064","reference_id":"","reference_type":"","scores":[{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25332","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25679","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25749","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2579","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25559","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25632","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25678","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25689","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25648","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25591","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25594","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25579","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2555","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25502","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25495","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25446","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-5064"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=531160","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=531160"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=682998","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=682998"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5064"},{"reference_url":"http://www.catonmat.net/blog/ldd-arbitrary-code-execution/","reference_id":"","reference_type":"","scores":[],"url":"http://www.catonmat.net/blog/ldd-arbitrary-code-execution/"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-1526.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-1526.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=692393","reference_id":"692393","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=692393"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-5064","reference_id":"CVE-2009-5064","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-5064"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1526","reference_id":"RHSA-2011:1526","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1526"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0125","reference_id":"RHSA-2012:0125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0126","reference_id":"RHSA-2012:0126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0126"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923427?format=json","purl":"pkg:deb/debian/glibc@2.10.1-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.10.1-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2009-5064"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3yq4-pzqz-4yap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61767?format=json","vulnerability_id":"VCID-42jj-9jmf-s3h5","summary":"Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4424.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4424.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4424","reference_id":"","reference_type":"","scores":[{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.6964","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69652","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69668","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69645","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69696","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69713","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69735","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.6972","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69707","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69747","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69756","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69737","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69789","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69797","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69801","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69775","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4424"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4424","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4424"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689423","reference_id":"689423","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689423"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=858238","reference_id":"858238","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=858238"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://usn.ubuntu.com/1991-1/","reference_id":"USN-1991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1991-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923439?format=json","purl":"pkg:deb/debian/glibc@2.17-94?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.17-94%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2012-4424"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-42jj-9jmf-s3h5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88507?format=json","vulnerability_id":"VCID-481z-kryb-97d5","summary":"glibc: strfmon format string problem","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1391.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1391.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1391","reference_id":"","reference_type":"","scores":[{"value":"0.19061","scoring_system":"epss","scoring_elements":"0.95296","published_at":"2026-04-01T12:55:00Z"},{"value":"0.19061","scoring_system":"epss","scoring_elements":"0.95307","published_at":"2026-04-02T12:55:00Z"},{"value":"0.19061","scoring_system":"epss","scoring_elements":"0.95313","published_at":"2026-04-04T12:55:00Z"},{"value":"0.19061","scoring_system":"epss","scoring_elements":"0.95318","published_at":"2026-04-07T12:55:00Z"},{"value":"0.19061","scoring_system":"epss","scoring_elements":"0.95325","published_at":"2026-04-08T12:55:00Z"},{"value":"0.19061","scoring_system":"epss","scoring_elements":"0.95328","published_at":"2026-04-09T12:55:00Z"},{"value":"0.19061","scoring_system":"epss","scoring_elements":"0.95333","published_at":"2026-04-12T12:55:00Z"},{"value":"0.19061","scoring_system":"epss","scoring_elements":"0.95335","published_at":"2026-04-13T12:55:00Z"},{"value":"0.19061","scoring_system":"epss","scoring_elements":"0.95343","published_at":"2026-04-16T12:55:00Z"},{"value":"0.19061","scoring_system":"epss","scoring_elements":"0.95346","published_at":"2026-04-18T12:55:00Z"},{"value":"0.19061","scoring_system":"epss","scoring_elements":"0.95348","published_at":"2026-04-21T12:55:00Z"},{"value":"0.19061","scoring_system":"epss","scoring_elements":"0.95349","published_at":"2026-04-24T12:55:00Z"},{"value":"0.19061","scoring_system":"epss","scoring_elements":"0.95352","published_at":"2026-04-26T12:55:00Z"},{"value":"0.19061","scoring_system":"epss","scoring_elements":"0.95353","published_at":"2026-04-29T12:55:00Z"},{"value":"0.19061","scoring_system":"epss","scoring_elements":"0.95363","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1391"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1391","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1391"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=524671","reference_id":"524671","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=524671"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/31550.c","reference_id":"CVE-2008-1391;OSVDB-43837","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/31550.c"},{"reference_url":"https://www.securityfocus.com/bid/28479/info","reference_id":"CVE-2008-1391;OSVDB-43837","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/28479/info"},{"reference_url":"https://usn.ubuntu.com/944-1/","reference_id":"USN-944-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/944-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923424?format=json","purl":"pkg:deb/debian/glibc@2.11-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.11-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2008-1391"],"risk_score":0.4,"exploitability":"2.0","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-481z-kryb-97d5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84247?format=json","vulnerability_id":"VCID-4nf7-929x-4bb1","summary":"glibc: nscd buffer manipulation vulnerability could lead to code execution or crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9984.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9984.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9984","reference_id":"","reference_type":"","scores":[{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65872","published_at":"2026-04-01T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.6599","published_at":"2026-05-05T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66016","published_at":"2026-04-26T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66014","published_at":"2026-04-29T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65913","published_at":"2026-04-02T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65943","published_at":"2026-04-04T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65909","published_at":"2026-04-07T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65961","published_at":"2026-04-08T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65973","published_at":"2026-04-09T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65991","published_at":"2026-04-11T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65978","published_at":"2026-04-12T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65948","published_at":"2026-04-13T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65983","published_at":"2026-04-16T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65996","published_at":"2026-04-18T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.65984","published_at":"2026-04-21T12:55:00Z"},{"value":"0.005","scoring_system":"epss","scoring_elements":"0.66004","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9984"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1463288","reference_id":"1463288","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1463288"},{"reference_url":"https://usn.ubuntu.com/6762-1/","reference_id":"USN-6762-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6762-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923437?format=json","purl":"pkg:deb/debian/glibc@2.19-14?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2014-9984"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4nf7-929x-4bb1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54364?format=json","vulnerability_id":"VCID-5g37-r914-r3g8","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1473.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1473.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1473","reference_id":"","reference_type":"","scores":[{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63503","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63563","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.6359","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63554","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63606","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63623","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63638","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63622","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63589","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63625","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63634","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63617","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63635","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63648","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63642","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00449","scoring_system":"epss","scoring_elements":"0.63616","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1473"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1209105","reference_id":"1209105","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1209105"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777197","reference_id":"777197","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2199","reference_id":"RHSA-2015:2199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2589","reference_id":"RHSA-2015:2589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2589"},{"reference_url":"https://usn.ubuntu.com/2519-1/","reference_id":"USN-2519-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2519-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923452?format=json","purl":"pkg:deb/debian/glibc@2.19-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-15%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2015-1473"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5g37-r914-r3g8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87956?format=json","vulnerability_id":"VCID-6fwn-j4p2-ffh9","summary":"glibc NIS password hash disclosure","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0015.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0015.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0015","reference_id":"","reference_type":"","scores":[{"value":"0.01544","scoring_system":"epss","scoring_elements":"0.81478","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01544","scoring_system":"epss","scoring_elements":"0.81396","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01544","scoring_system":"epss","scoring_elements":"0.81388","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01544","scoring_system":"epss","scoring_elements":"0.81425","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01544","scoring_system":"epss","scoring_elements":"0.81426","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01544","scoring_system":"epss","scoring_elements":"0.81448","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01544","scoring_system":"epss","scoring_elements":"0.81456","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01544","scoring_system":"epss","scoring_elements":"0.8146","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01817","scoring_system":"epss","scoring_elements":"0.82809","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01817","scoring_system":"epss","scoring_elements":"0.82823","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01817","scoring_system":"epss","scoring_elements":"0.82818","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01817","scoring_system":"epss","scoring_elements":"0.82844","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01817","scoring_system":"epss","scoring_elements":"0.8285","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01817","scoring_system":"epss","scoring_elements":"0.82866","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01817","scoring_system":"epss","scoring_elements":"0.82793","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0015"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0015","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0015"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=555573","reference_id":"555573","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=555573"},{"reference_url":"https://usn.ubuntu.com/1396-1/","reference_id":"USN-1396-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1396-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923429?format=json","purl":"pkg:deb/debian/glibc@2.10.2-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.10.2-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2010-0015"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6fwn-j4p2-ffh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81840?format=json","vulnerability_id":"VCID-6kb1-yuq8-tfbs","summary":"glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19126.json","reference_id":"","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19126.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19126","reference_id":"","reference_type":"","scores":[{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03134","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03129","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03135","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03124","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03174","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.0631","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06321","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06369","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06412","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06404","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06399","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06388","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06327","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06337","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06277","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06344","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-19126"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4FQ5LC6JOYSOYFPRUZ4S45KL6IP3RPPZ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZFJ5E7NWOL6ROE5QVICHKIOUGCPFJVUH/"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=25204","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=25204"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1774681","reference_id":"1774681","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1774681"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945250","reference_id":"945250","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=945250"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x64:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x64:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x64:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19126","reference_id":"CVE-2019-19126","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-19126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:1828","reference_id":"RHSA-2020:1828","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:1828"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3861","reference_id":"RHSA-2020:3861","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3861"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0949","reference_id":"RHSA-2021:0949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0949"},{"reference_url":"https://usn.ubuntu.com/4416-1/","reference_id":"USN-4416-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4416-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923475?format=json","purl":"pkg:deb/debian/glibc@2.29-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.29-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2019-19126"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6kb1-yuq8-tfbs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62165?format=json","vulnerability_id":"VCID-6qa1-upks-g3dm","summary":"Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3999.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3999","reference_id":"","reference_type":"","scores":[{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74936","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74805","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74806","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74835","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74808","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74841","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74855","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74879","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74858","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74849","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74885","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74892","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74883","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74919","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74926","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00848","scoring_system":"epss","scoring_elements":"0.74929","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3999"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3999"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024637","reference_id":"2024637","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024637"},{"reference_url":"https://www.openwall.com/lists/oss-security/2022/01/24/4","reference_id":"4","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/"}],"url":"https://www.openwall.com/lists/oss-security/2022/01/24/4"},{"reference_url":"https://security.archlinux.org/AVG-1621","reference_id":"AVG-1621","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1621"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2021-3999","reference_id":"CVE-2021-3999","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2021-3999"},{"reference_url":"https://security-tracker.debian.org/tracker/CVE-2021-3999","reference_id":"CVE-2021-3999","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/"}],"url":"https://security-tracker.debian.org/tracker/CVE-2021-3999"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e","reference_id":"gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e"},{"reference_url":"https://security.gentoo.org/glsa/202208-24","reference_id":"GLSA-202208-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-24"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221104-0001/","reference_id":"ntap-20221104-0001","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221104-0001/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0896","reference_id":"RHSA-2022:0896","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0896"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=28769","reference_id":"show_bug.cgi?id=28769","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-02T20:54:28Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=28769"},{"reference_url":"https://usn.ubuntu.com/5310-1/","reference_id":"USN-5310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-1/"},{"reference_url":"https://usn.ubuntu.com/5310-2/","reference_id":"USN-5310-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-2/"},{"reference_url":"https://usn.ubuntu.com/6762-1/","reference_id":"USN-6762-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6762-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923488?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923487?format=json","purl":"pkg:deb/debian/glibc@2.33-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.33-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2021-3999"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6qa1-upks-g3dm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58069?format=json","vulnerability_id":"VCID-6t8d-48g7-1yey","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html"},{"reference_url":"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0680.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2017-0680.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8779.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8779.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8779","reference_id":"","reference_type":"","scores":[{"value":"0.05548","scoring_system":"epss","scoring_elements":"0.90294","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05548","scoring_system":"epss","scoring_elements":"0.90306","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05548","scoring_system":"epss","scoring_elements":"0.90298","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05548","scoring_system":"epss","scoring_elements":"0.90297","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05694","scoring_system":"epss","scoring_elements":"0.90423","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05694","scoring_system":"epss","scoring_elements":"0.90421","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09682","scoring_system":"epss","scoring_elements":"0.92918","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09682","scoring_system":"epss","scoring_elements":"0.92889","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09682","scoring_system":"epss","scoring_elements":"0.92917","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09682","scoring_system":"epss","scoring_elements":"0.92927","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09682","scoring_system":"epss","scoring_elements":"0.92916","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09682","scoring_system":"epss","scoring_elements":"0.92897","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09682","scoring_system":"epss","scoring_elements":"0.92902","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09682","scoring_system":"epss","scoring_elements":"0.92901","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09682","scoring_system":"epss","scoring_elements":"0.92909","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09682","scoring_system":"epss","scoring_elements":"0.92914","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Sep/7","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Sep/7"},{"reference_url":"https://seclists.org/bugtraq/2019/Sep/7","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Sep/7"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=17905","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=17905"},{"reference_url":"https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html"},{"reference_url":"http://www.debian.org/security/2016/dsa-3480","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3480"},{"reference_url":"http://www.debian.org/security/2016/dsa-3481","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3481"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/19/11","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/19/11"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/20/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/20/1"},{"reference_url":"http://www.securityfocus.com/bid/82244","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/82244"},{"reference_url":"http://www.ubuntu.com/usn/USN-2985-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2985-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2985-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2985-2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300312","reference_id":"1300312","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300312"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812455","reference_id":"812455","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812455"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8779","reference_id":"CVE-2015-8779","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8779"},{"reference_url":"https://security.gentoo.org/glsa/201602-02","reference_id":"GLSA-201602-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-02"},{"reference_url":"https://security.gentoo.org/glsa/201702-11","reference_id":"GLSA-201702-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201702-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0680","reference_id":"RHSA-2017:0680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1916","reference_id":"RHSA-2017:1916","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1916"},{"reference_url":"https://usn.ubuntu.com/2985-1/","reference_id":"USN-2985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2985-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923457?format=json","purl":"pkg:deb/debian/glibc@2.21-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.21-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2015-8779"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6t8d-48g7-1yey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57208?format=json","vulnerability_id":"VCID-746m-vcyt-97gh","summary":"Multiple vulnerabilities have been found in GNU C Library, the\n    worst of which allowing arbitrary code execution and privilege escalation.","references":[{"reference_url":"http://dividead.wordpress.com/2009/06/01/glibc-timezone-integer-overflow/","reference_id":"","reference_type":"","scores":[],"url":"http://dividead.wordpress.com/2009/06/01/glibc-timezone-integer-overflow/"},{"reference_url":"http://lists.grok.org.uk/pipermail/full-disclosure/2011-December/084452.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2011-December/084452.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-5029.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-5029.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-5029","reference_id":"","reference_type":"","scores":[{"value":"0.02765","scoring_system":"epss","scoring_elements":"0.8609","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02765","scoring_system":"epss","scoring_elements":"0.86032","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02765","scoring_system":"epss","scoring_elements":"0.86027","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02765","scoring_system":"epss","scoring_elements":"0.86045","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02765","scoring_system":"epss","scoring_elements":"0.8605","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02765","scoring_system":"epss","scoring_elements":"0.86041","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02765","scoring_system":"epss","scoring_elements":"0.86062","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02765","scoring_system":"epss","scoring_elements":"0.86071","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05109","scoring_system":"epss","scoring_elements":"0.8985","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05109","scoring_system":"epss","scoring_elements":"0.89799","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05109","scoring_system":"epss","scoring_elements":"0.89802","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05109","scoring_system":"epss","scoring_elements":"0.89816","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05109","scoring_system":"epss","scoring_elements":"0.8982","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05109","scoring_system":"epss","scoring_elements":"0.89837","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05109","scoring_system":"epss","scoring_elements":"0.89844","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-5029"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5029","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5029"},{"reference_url":"http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=97ac2654b2d831acaa18a2b018b0736245903fd2","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=97ac2654b2d831acaa18a2b018b0736245903fd2"},{"reference_url":"http://sourceware.org/ml/libc-alpha/2011-12/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/ml/libc-alpha/2011-12/msg00037.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=761245","reference_id":"761245","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=761245"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-5029","reference_id":"CVE-2009-5029","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-5029"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/36404.c","reference_id":"CVE-2009-5029;OSVDB-77508","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/36404.c"},{"reference_url":"https://www.securityfocus.com/bid/50898/info","reference_id":"CVE-2009-5029;OSVDB-77508","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/50898/info"},{"reference_url":"https://security.gentoo.org/glsa/201312-01","reference_id":"GLSA-201312-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0058","reference_id":"RHSA-2012:0058","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0058"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0125","reference_id":"RHSA-2012:0125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0126","reference_id":"RHSA-2012:0126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0126"},{"reference_url":"https://usn.ubuntu.com/1396-1/","reference_id":"USN-1396-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1396-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923426?format=json","purl":"pkg:deb/debian/glibc@2.13-24?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.13-24%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2009-5029"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-746m-vcyt-97gh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61415?format=json","vulnerability_id":"VCID-75dc-1fd5-u3e2","summary":"Multiple vulnerabilities have been found in glibc, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9169.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9169.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9169","reference_id":"","reference_type":"","scores":[{"value":"0.0708","scoring_system":"epss","scoring_elements":"0.91555","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0708","scoring_system":"epss","scoring_elements":"0.91541","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0708","scoring_system":"epss","scoring_elements":"0.91536","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0708","scoring_system":"epss","scoring_elements":"0.91544","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0708","scoring_system":"epss","scoring_elements":"0.91543","published_at":"2026-04-26T12:55:00Z"},{"value":"0.12135","scoring_system":"epss","scoring_elements":"0.93818","published_at":"2026-04-13T12:55:00Z"},{"value":"0.13732","scoring_system":"epss","scoring_elements":"0.94249","published_at":"2026-04-04T12:55:00Z"},{"value":"0.13732","scoring_system":"epss","scoring_elements":"0.9425","published_at":"2026-04-07T12:55:00Z"},{"value":"0.13732","scoring_system":"epss","scoring_elements":"0.94259","published_at":"2026-04-08T12:55:00Z"},{"value":"0.13732","scoring_system":"epss","scoring_elements":"0.94264","published_at":"2026-04-09T12:55:00Z"},{"value":"0.13732","scoring_system":"epss","scoring_elements":"0.94268","published_at":"2026-04-11T12:55:00Z"},{"value":"0.13732","scoring_system":"epss","scoring_elements":"0.94228","published_at":"2026-04-01T12:55:00Z"},{"value":"0.13732","scoring_system":"epss","scoring_elements":"0.94238","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-9169"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9169"},{"reference_url":"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140","reference_id":"","reference_type":"","scores":[],"url":"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34140"},{"reference_url":"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142","reference_id":"","reference_type":"","scores":[],"url":"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34142"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10278","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10278"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190315-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190315-0002/"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=24114","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=24114"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=583dd860d5b833037175247230a328f0050dbfe9","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=583dd860d5b833037175247230a328f0050dbfe9"},{"reference_url":"https://support.f5.com/csp/article/K54823184","reference_id":"","reference_type":"","scores":[],"url":"https://support.f5.com/csp/article/K54823184"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2022.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"reference_url":"http://www.securityfocus.com/bid/107160","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/107160"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1684057","reference_id":"1684057","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1684057"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924612","reference_id":"924612","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924612"},{"reference_url":"https://security.archlinux.org/ASA-201911-3","reference_id":"ASA-201911-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201911-3"},{"reference_url":"https://security.archlinux.org/AVG-855","reference_id":"AVG-855","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-855"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mcafee:web_gateway:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9169","reference_id":"CVE-2019-9169","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-9169"},{"reference_url":"https://security.gentoo.org/glsa/202006-04","reference_id":"GLSA-202006-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202006-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1585","reference_id":"RHSA-2021:1585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1585"},{"reference_url":"https://usn.ubuntu.com/4416-1/","reference_id":"USN-4416-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4416-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923477?format=json","purl":"pkg:deb/debian/glibc@2.28-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2019-9169"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-75dc-1fd5-u3e2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88538?format=json","vulnerability_id":"VCID-7be7-f2ha-r7h6","summary":"libbind off-by-one buffer overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0122.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0122.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0122","reference_id":"","reference_type":"","scores":[{"value":"0.00923","scoring_system":"epss","scoring_elements":"0.75931","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00923","scoring_system":"epss","scoring_elements":"0.75934","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00923","scoring_system":"epss","scoring_elements":"0.75967","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00923","scoring_system":"epss","scoring_elements":"0.75946","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00923","scoring_system":"epss","scoring_elements":"0.75979","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00923","scoring_system":"epss","scoring_elements":"0.75993","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00923","scoring_system":"epss","scoring_elements":"0.76018","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82283","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82277","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82312","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82314","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82335","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82346","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01697","scoring_system":"epss","scoring_elements":"0.82351","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01722","scoring_system":"epss","scoring_elements":"0.82499","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-0122"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0122","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0122"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=429149","reference_id":"429149","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=429149"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0300","reference_id":"RHSA-2008:0300","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0300"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923406?format=json","purl":"pkg:deb/debian/glibc@2.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2008-0122"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7be7-f2ha-r7h6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59553?format=json","vulnerability_id":"VCID-7czm-1nzx-nfbn","summary":"Multiple vulnerabilities have been found in the GNU C library, the\n    worst allowing for remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7423.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7423.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7423","reference_id":"","reference_type":"","scores":[{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.89367","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.89278","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.89284","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.89298","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.893","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.89317","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.89322","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.89331","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.89328","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.89325","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.89338","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.89337","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.89333","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.89351","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.89355","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04669","scoring_system":"epss","scoring_elements":"0.89358","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-7423"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7423","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7423"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:P/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1187109","reference_id":"1187109","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1187109"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722075","reference_id":"722075","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722075"},{"reference_url":"https://security.gentoo.org/glsa/201602-02","reference_id":"GLSA-201602-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0863","reference_id":"RHSA-2015:0863","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0863"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2199","reference_id":"RHSA-2015:2199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2589","reference_id":"RHSA-2015:2589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2589"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1207","reference_id":"RHSA-2016:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1207"},{"reference_url":"https://usn.ubuntu.com/2519-1/","reference_id":"USN-2519-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2519-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923445?format=json","purl":"pkg:deb/debian/glibc@2.19-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2013-7423"],"risk_score":0.7,"exploitability":"0.5","weighted_severity":"1.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7czm-1nzx-nfbn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59747?format=json","vulnerability_id":"VCID-7d3q-a8t2-s3d8","summary":"An integer overflow in the dynamic loader, ld.so, could result in the\n    execution of arbitrary code with escalated privileges.","references":[{"reference_url":"http://bugs.gentoo.org/show_bug.cgi?id=183844","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.gentoo.org/show_bug.cgi?id=183844"},{"reference_url":"http://osvdb.org/37901","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/37901"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3508.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3508.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3508","reference_id":"","reference_type":"","scores":[{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15528","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15772","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15842","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15908","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15707","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15793","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15852","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15832","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15795","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15725","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15647","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15656","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15702","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15718","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15714","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00051","scoring_system":"epss","scoring_elements":"0.15658","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-3508"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3508","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3508"},{"reference_url":"http://secunia.com/advisories/25864","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25864"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200707-04.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200707-04.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35240","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35240"},{"reference_url":"http://sources.gentoo.org/viewcvs.py/gentoo/src/patchsets/glibc/2.5/1600_all_glibc-hwcap-mask-secure.patch?rev=1.1&view=markup","reference_id":"","reference_type":"","scores":[],"url":"http://sources.gentoo.org/viewcvs.py/gentoo/src/patchsets/glibc/2.5/1600_all_glibc-hwcap-mask-secure.patch?rev=1.1&view=markup"},{"reference_url":"http://www.securityfocus.com/bid/24758","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24758"},{"reference_url":"http://www.securitytracker.com/id?1018334","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1018334"},{"reference_url":"http://www.sourceware.org/ml/libc-hacker/2007-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.sourceware.org/ml/libc-hacker/2007-07/msg00001.html"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2418","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2418"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=247208","reference_id":"247208","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=247208"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=431858","reference_id":"431858","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=431858"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gentoo:glibc:*:r3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gentoo:glibc:*:r3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gentoo:glibc:*:r3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3508","reference_id":"CVE-2007-3508","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-3508"},{"reference_url":"https://security.gentoo.org/glsa/200707-04","reference_id":"GLSA-200707-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200707-04"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923421?format=json","purl":"pkg:deb/debian/glibc@2.6-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.6-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2007-3508"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7d3q-a8t2-s3d8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61187?format=json","vulnerability_id":"VCID-7fvy-59bc-jqf6","summary":"Multiple vulnerabilities have been found in the GNU C Library, the\n    worst of which allows context-dependent attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html"},{"reference_url":"http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1234.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1234.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1234","reference_id":"","reference_type":"","scores":[{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79408","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79555","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79519","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79525","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79541","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79415","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79438","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79425","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79453","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79461","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79483","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79466","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79456","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79486","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79484","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01266","scoring_system":"epss","scoring_elements":"0.79487","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-1234"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234"},{"reference_url":"http://seclists.org/fulldisclosure/2021/Sep/0","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2021/Sep/0"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=19779","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=19779"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=5171f3079f2cc53e0548fc4967361f4d1ce9d7ea"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/03/07/16","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/03/07/16"},{"reference_url":"http://www.securityfocus.com/bid/84204","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/84204"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1315647","reference_id":"1315647","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1315647"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1234","reference_id":"CVE-2016-1234","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-1234"},{"reference_url":"https://security.gentoo.org/glsa/201702-11","reference_id":"GLSA-201702-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201702-11"},{"reference_url":"https://usn.ubuntu.com/3239-1/","reference_id":"USN-3239-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3239-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923460?format=json","purl":"pkg:deb/debian/glibc@2.22-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.22-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2016-1234"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7fvy-59bc-jqf6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87561?format=json","vulnerability_id":"VCID-7xzr-rdk3-cfhg","summary":"glibc: De-recursivise regular expression engine","references":[{"reference_url":"http://cxib.net/stuff/proftpd.gnu.c","reference_id":"","reference_type":"","scores":[],"url":"http://cxib.net/stuff/proftpd.gnu.c"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4051.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4051.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4051","reference_id":"","reference_type":"","scores":[{"value":"0.04658","scoring_system":"epss","scoring_elements":"0.89358","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04658","scoring_system":"epss","scoring_elements":"0.89268","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04658","scoring_system":"epss","scoring_elements":"0.89274","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04658","scoring_system":"epss","scoring_elements":"0.89288","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04658","scoring_system":"epss","scoring_elements":"0.89291","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04658","scoring_system":"epss","scoring_elements":"0.89308","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04658","scoring_system":"epss","scoring_elements":"0.89313","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04658","scoring_system":"epss","scoring_elements":"0.89322","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04658","scoring_system":"epss","scoring_elements":"0.89319","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04658","scoring_system":"epss","scoring_elements":"0.89316","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04658","scoring_system":"epss","scoring_elements":"0.89329","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04658","scoring_system":"epss","scoring_elements":"0.89328","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04658","scoring_system":"epss","scoring_elements":"0.89324","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04658","scoring_system":"epss","scoring_elements":"0.89342","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04658","scoring_system":"epss","scoring_elements":"0.89346","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04658","scoring_system":"epss","scoring_elements":"0.89349","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4051"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4051","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4051"},{"reference_url":"http://seclists.org/fulldisclosure/2011/Jan/78","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2011/Jan/78"},{"reference_url":"http://secunia.com/advisories/42547","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42547"},{"reference_url":"http://securityreason.com/achievement_securityalert/93","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/achievement_securityalert/93"},{"reference_url":"http://securitytracker.com/id?1024832","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1024832"},{"reference_url":"https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E"},{"reference_url":"http://www.exploit-db.com/exploits/15935","reference_id":"","reference_type":"","scores":[],"url":"http://www.exploit-db.com/exploits/15935"},{"reference_url":"http://www.kb.cert.org/vuls/id/912279","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/912279"},{"reference_url":"http://www.securityfocus.com/archive/1/515589/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/515589/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/45233","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/45233"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=645859","reference_id":"645859","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=645859"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4051","reference_id":"CVE-2010-4051","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4051"},{"reference_url":"http://securityreason.com/securityalert/8003","reference_id":"CVE-2010-4051;CVE-2010-4052","reference_type":"exploit","scores":[],"url":"http://securityreason.com/securityalert/8003"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/15935.c","reference_id":"CVE-2010-4051;CVE-2010-4052","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/15935.c"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923431?format=json","purl":"pkg:deb/debian/glibc@2.19-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2010-4051"],"risk_score":9.0,"exploitability":"2.0","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7xzr-rdk3-cfhg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85197?format=json","vulnerability_id":"VCID-814q-u5m5-gqec","summary":"glibc: stack (frame) overflow in getaddrinfo() when called with AF_INET, AF_INET6 (incomplete fix for CVE-2013-4458)","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3706.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3706.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3706","reference_id":"","reference_type":"","scores":[{"value":"0.02478","scoring_system":"epss","scoring_elements":"0.85348","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02478","scoring_system":"epss","scoring_elements":"0.85335","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02478","scoring_system":"epss","scoring_elements":"0.85334","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02478","scoring_system":"epss","scoring_elements":"0.85213","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02478","scoring_system":"epss","scoring_elements":"0.85225","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02478","scoring_system":"epss","scoring_elements":"0.85244","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02478","scoring_system":"epss","scoring_elements":"0.85246","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02478","scoring_system":"epss","scoring_elements":"0.85268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02478","scoring_system":"epss","scoring_elements":"0.85276","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02478","scoring_system":"epss","scoring_elements":"0.85291","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02478","scoring_system":"epss","scoring_elements":"0.85288","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02478","scoring_system":"epss","scoring_elements":"0.85285","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02478","scoring_system":"epss","scoring_elements":"0.85306","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02478","scoring_system":"epss","scoring_elements":"0.85307","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02478","scoring_system":"epss","scoring_elements":"0.85303","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02478","scoring_system":"epss","scoring_elements":"0.85326","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3706"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://source.android.com/security/bulletin/2017-12-01","reference_id":"","reference_type":"","scores":[],"url":"https://source.android.com/security/bulletin/2017-12-01"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=20010","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=20010"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=4ab2ab03d4351914ee53248dc5aef4a8c88ff8b9","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=4ab2ab03d4351914ee53248dc5aef4a8c88ff8b9"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21995039","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21995039"},{"reference_url":"http://www.securityfocus.com/bid/102073","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/102073"},{"reference_url":"http://www.securityfocus.com/bid/88440","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/88440"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1330887","reference_id":"1330887","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1330887"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3706","reference_id":"CVE-2016-3706","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3706"},{"reference_url":"https://usn.ubuntu.com/3239-1/","reference_id":"USN-3239-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3239-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923460?format=json","purl":"pkg:deb/debian/glibc@2.22-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.22-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2016-3706"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-814q-u5m5-gqec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85132?format=json","vulnerability_id":"VCID-84zb-rzwk-fbfp","summary":"glibc: libtirpc: stack (frame) overflow in Sun RPC clntudp_call()","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4429.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4429.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4429","reference_id":"","reference_type":"","scores":[{"value":"0.01997","scoring_system":"epss","scoring_elements":"0.8358","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01997","scoring_system":"epss","scoring_elements":"0.83742","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01997","scoring_system":"epss","scoring_elements":"0.83706","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01997","scoring_system":"epss","scoring_elements":"0.83713","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01997","scoring_system":"epss","scoring_elements":"0.83719","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01997","scoring_system":"epss","scoring_elements":"0.83593","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01997","scoring_system":"epss","scoring_elements":"0.83607","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01997","scoring_system":"epss","scoring_elements":"0.83609","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01997","scoring_system":"epss","scoring_elements":"0.83633","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01997","scoring_system":"epss","scoring_elements":"0.83641","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01997","scoring_system":"epss","scoring_elements":"0.83658","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01997","scoring_system":"epss","scoring_elements":"0.83651","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01997","scoring_system":"epss","scoring_elements":"0.83646","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01997","scoring_system":"epss","scoring_elements":"0.83681","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01997","scoring_system":"epss","scoring_elements":"0.83682","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4429"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2020/06/msg00027.html"},{"reference_url":"https://source.android.com/security/bulletin/2017-12-01","reference_id":"","reference_type":"","scores":[],"url":"https://source.android.com/security/bulletin/2017-12-01"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=20112","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=20112"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bc779a1a5b3035133024b21e2f339fe4219fb11c","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bc779a1a5b3035133024b21e2f339fe4219fb11c"},{"reference_url":"https://www.oracle.com//security-alerts/cpujul2021.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21995039","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21995039"},{"reference_url":"http://www.securityfocus.com/bid/102073","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/102073"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1337136","reference_id":"1337136","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1337136"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840347","reference_id":"840347","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840347"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4429","reference_id":"CVE-2016-4429","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4429"},{"reference_url":"https://usn.ubuntu.com/3239-1/","reference_id":"USN-3239-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3239-1/"},{"reference_url":"https://usn.ubuntu.com/3759-1/","reference_id":"USN-3759-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3759-1/"},{"reference_url":"https://usn.ubuntu.com/3759-2/","reference_id":"USN-3759-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3759-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923462?format=json","purl":"pkg:deb/debian/glibc@2.22-10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.22-10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2016-4429"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-84zb-rzwk-fbfp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83798?format=json","vulnerability_id":"VCID-8egr-f63v-3uht","summary":"glibc: Buffer overflow triggerable via LD_LIBRARY_PATH","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000409.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000409.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000409","reference_id":"","reference_type":"","scores":[{"value":"0.00841","scoring_system":"epss","scoring_elements":"0.74681","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75355","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75388","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75367","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.7541","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75419","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75439","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75417","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75406","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75447","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75454","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75443","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75478","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75482","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75487","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00883","scoring_system":"epss","scoring_elements":"0.75498","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000409"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000409","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000409"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1522830","reference_id":"1522830","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1522830"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884133","reference_id":"884133","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884133"},{"reference_url":"https://usn.ubuntu.com/3534-1/","reference_id":"USN-3534-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3534-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923466?format=json","purl":"pkg:deb/debian/glibc@2.25-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.25-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2017-1000409"],"risk_score":8.4,"exploitability":"2.0","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8egr-f63v-3uht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43780?format=json","vulnerability_id":"VCID-8p27-z2tz-4bbm","summary":"Multiple vulnerabilities in glibc could result in Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33574.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-33574.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-33574","reference_id":"","reference_type":"","scores":[{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30847","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30929","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30653","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30537","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30453","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30973","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.3102","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30838","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30897","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30927","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30887","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30842","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30873","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30852","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00119","scoring_system":"epss","scoring_elements":"0.30818","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.31863","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-33574"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33574"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1965408","reference_id":"1965408","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1965408"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989147","reference_id":"989147","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989147"},{"reference_url":"https://security.archlinux.org/AVG-1621","reference_id":"AVG-1621","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1621"},{"reference_url":"https://security.gentoo.org/glsa/202107-07","reference_id":"GLSA-202107-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202107-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4358","reference_id":"RHSA-2021:4358","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4358"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923485?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923484?format=json","purl":"pkg:deb/debian/glibc@2.32-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.32-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2021-33574"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8p27-z2tz-4bbm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58062?format=json","vulnerability_id":"VCID-991k-es3s-hbg4","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8121.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8121.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8121","reference_id":"","reference_type":"","scores":[{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86487","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86497","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86516","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86515","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86535","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86545","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.8656","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86557","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86549","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86564","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86569","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86562","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86581","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86589","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86588","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02992","scoring_system":"epss","scoring_elements":"0.86609","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-8121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1165192","reference_id":"1165192","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1165192"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779587","reference_id":"779587","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779587"},{"reference_url":"https://security.gentoo.org/glsa/201602-02","reference_id":"GLSA-201602-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0327","reference_id":"RHSA-2015:0327","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0327"},{"reference_url":"https://usn.ubuntu.com/2985-1/","reference_id":"USN-2985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2985-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923442?format=json","purl":"pkg:deb/debian/glibc@2.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2014-8121"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-991k-es3s-hbg4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34315?format=json","vulnerability_id":"VCID-9nqp-tfvr-ayen","summary":"Multiple vulnerabilities in glibc could result in Local Privilege Escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4806.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4806.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4806","reference_id":"","reference_type":"","scores":[{"value":"0.01895","scoring_system":"epss","scoring_elements":"0.83308","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01895","scoring_system":"epss","scoring_elements":"0.83156","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01895","scoring_system":"epss","scoring_elements":"0.83193","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01895","scoring_system":"epss","scoring_elements":"0.832","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01895","scoring_system":"epss","scoring_elements":"0.83216","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01895","scoring_system":"epss","scoring_elements":"0.8321","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01895","scoring_system":"epss","scoring_elements":"0.83206","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01895","scoring_system":"epss","scoring_elements":"0.83242","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01895","scoring_system":"epss","scoring_elements":"0.83243","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01895","scoring_system":"epss","scoring_elements":"0.8317","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01895","scoring_system":"epss","scoring_elements":"0.83168","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01947","scoring_system":"epss","scoring_elements":"0.83518","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01947","scoring_system":"epss","scoring_elements":"0.83511","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01947","scoring_system":"epss","scoring_elements":"0.8352","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01947","scoring_system":"epss","scoring_elements":"0.83488","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4806"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2237782","reference_id":"2237782","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-15T19:32:30Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2237782"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb","reference_id":"cpe:/a:redhat:rhel_eus:8.6::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:9::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos","reference_id":"cpe:/o:redhat:rhel_eus:8.6::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8","reference_id":"cpe:/o:redhat:rhev_hypervisor:4.4::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-4806","reference_id":"CVE-2023-4806","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-15T19:32:30Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-4806"},{"reference_url":"https://security.gentoo.org/glsa/202310-03","reference_id":"GLSA-202310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202310-03"},{"reference_url":"https://access.redhat.com/errata/RHBA-2024:2413","reference_id":"RHBA-2024:2413","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-15T19:32:30Z/"}],"url":"https://access.redhat.com/errata/RHBA-2024:2413"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5453","reference_id":"RHSA-2023:5453","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-15T19:32:30Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:5453"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5455","reference_id":"RHSA-2023:5455","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-15T19:32:30Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:5455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7409","reference_id":"RHSA-2023:7409","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-15T19:32:30Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:7409"},{"reference_url":"https://usn.ubuntu.com/6541-1/","reference_id":"USN-6541-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6541-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923491?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923493?format=json","purl":"pkg:deb/debian/glibc@2.37-10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.37-10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2023-4806"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9nqp-tfvr-ayen"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42262?format=json","vulnerability_id":"VCID-9tjq-wrg8-7bfw","summary":"PHP contains several vulnerabilities including buffer and integer overflows\n    which could lead to the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4840.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4840.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4840","reference_id":"","reference_type":"","scores":[{"value":"0.01408","scoring_system":"epss","scoring_elements":"0.80579","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01592","scoring_system":"epss","scoring_elements":"0.81603","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01592","scoring_system":"epss","scoring_elements":"0.81624","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01592","scoring_system":"epss","scoring_elements":"0.81622","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01592","scoring_system":"epss","scoring_elements":"0.81649","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01592","scoring_system":"epss","scoring_elements":"0.81654","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01592","scoring_system":"epss","scoring_elements":"0.81674","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01592","scoring_system":"epss","scoring_elements":"0.81592","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01592","scoring_system":"epss","scoring_elements":"0.81693","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01592","scoring_system":"epss","scoring_elements":"0.81692","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01592","scoring_system":"epss","scoring_elements":"0.81696","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01592","scoring_system":"epss","scoring_elements":"0.81721","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01592","scoring_system":"epss","scoring_elements":"0.81729","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01592","scoring_system":"epss","scoring_elements":"0.81736","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01592","scoring_system":"epss","scoring_elements":"0.81661","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-4840"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4840","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4840"},{"reference_url":"https://security.gentoo.org/glsa/200710-02","reference_id":"GLSA-200710-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-02"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923422?format=json","purl":"pkg:deb/debian/glibc@2.7-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.7-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2007-4840"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9tjq-wrg8-7bfw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88516?format=json","vulnerability_id":"VCID-9wwp-9dpd-s7he","summary":"Kernel doesn't clear DF for signal handlers","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1367.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1367.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1367","reference_id":"","reference_type":"","scores":[{"value":"0.03849","scoring_system":"epss","scoring_elements":"0.88136","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03849","scoring_system":"epss","scoring_elements":"0.88145","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03849","scoring_system":"epss","scoring_elements":"0.88161","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03849","scoring_system":"epss","scoring_elements":"0.88167","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03849","scoring_system":"epss","scoring_elements":"0.88186","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03849","scoring_system":"epss","scoring_elements":"0.88192","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03849","scoring_system":"epss","scoring_elements":"0.88202","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04362","scoring_system":"epss","scoring_elements":"0.8896","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04362","scoring_system":"epss","scoring_elements":"0.88959","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04362","scoring_system":"epss","scoring_elements":"0.88971","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04362","scoring_system":"epss","scoring_elements":"0.8897","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04362","scoring_system":"epss","scoring_elements":"0.88966","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04362","scoring_system":"epss","scoring_elements":"0.88983","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04362","scoring_system":"epss","scoring_elements":"0.88991","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04362","scoring_system":"epss","scoring_elements":"0.88998","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1367"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=437312","reference_id":"437312","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=437312"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=465583","reference_id":"465583","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=465583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0211","reference_id":"RHSA-2008:0211","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0211"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0233","reference_id":"RHSA-2008:0233","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0233"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:0508","reference_id":"RHSA-2008:0508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:0508"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923423?format=json","purl":"pkg:deb/debian/glibc@2.7-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.7-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2008-1367"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9wwp-9dpd-s7he"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54362?format=json","vulnerability_id":"VCID-aapy-xr76-zbc4","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9402.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9402.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9402","reference_id":"","reference_type":"","scores":[{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92444","published_at":"2026-04-01T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92451","published_at":"2026-04-02T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92459","published_at":"2026-04-04T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92474","published_at":"2026-04-08T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92479","published_at":"2026-04-09T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92485","published_at":"2026-04-11T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92487","published_at":"2026-04-12T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92486","published_at":"2026-04-13T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92496","published_at":"2026-04-18T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92499","published_at":"2026-04-21T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92501","published_at":"2026-04-24T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92502","published_at":"2026-04-26T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92498","published_at":"2026-04-29T12:55:00Z"},{"value":"0.087","scoring_system":"epss","scoring_elements":"0.92508","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1175369","reference_id":"1175369","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1175369"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775572","reference_id":"775572","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775572"},{"reference_url":"https://security.gentoo.org/glsa/201602-02","reference_id":"GLSA-201602-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0805","reference_id":"RHSA-2018:0805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0805"},{"reference_url":"https://usn.ubuntu.com/2519-1/","reference_id":"USN-2519-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2519-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923437?format=json","purl":"pkg:deb/debian/glibc@2.19-14?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2014-9402"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aapy-xr76-zbc4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89716?format=json","vulnerability_id":"VCID-ag2y-afz2-33gu","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0028.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0028.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0028","reference_id":"","reference_type":"","scores":[{"value":"0.56051","scoring_system":"epss","scoring_elements":"0.98084","published_at":"2026-04-01T12:55:00Z"},{"value":"0.56051","scoring_system":"epss","scoring_elements":"0.98088","published_at":"2026-04-02T12:55:00Z"},{"value":"0.56051","scoring_system":"epss","scoring_elements":"0.98091","published_at":"2026-04-04T12:55:00Z"},{"value":"0.56051","scoring_system":"epss","scoring_elements":"0.98092","published_at":"2026-04-07T12:55:00Z"},{"value":"0.56051","scoring_system":"epss","scoring_elements":"0.98096","published_at":"2026-04-08T12:55:00Z"},{"value":"0.56051","scoring_system":"epss","scoring_elements":"0.98097","published_at":"2026-04-09T12:55:00Z"},{"value":"0.56051","scoring_system":"epss","scoring_elements":"0.98102","published_at":"2026-04-12T12:55:00Z"},{"value":"0.56051","scoring_system":"epss","scoring_elements":"0.98103","published_at":"2026-04-13T12:55:00Z"},{"value":"0.56051","scoring_system":"epss","scoring_elements":"0.98109","published_at":"2026-04-26T12:55:00Z"},{"value":"0.56051","scoring_system":"epss","scoring_elements":"0.98111","published_at":"2026-04-29T12:55:00Z"},{"value":"0.56051","scoring_system":"epss","scoring_elements":"0.98107","published_at":"2026-04-24T12:55:00Z"},{"value":"0.56051","scoring_system":"epss","scoring_elements":"0.98118","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0028"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0028","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0028"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616941","reference_id":"1616941","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616941"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:051","reference_id":"RHSA-2003:051","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:051"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:052","reference_id":"RHSA-2003:052","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:052"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:089","reference_id":"RHSA-2003:089","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:089"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:090","reference_id":"RHSA-2003:090","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:090"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:091","reference_id":"RHSA-2003:091","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:091"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:168","reference_id":"RHSA-2003:168","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:168"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:212","reference_id":"RHSA-2003:212","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:212"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923414?format=json","purl":"pkg:deb/debian/glibc@2.3.1-16?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.3.1-16%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2003-0028"],"risk_score":0.2,"exploitability":"0.5","weighted_severity":"0.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ag2y-afz2-33gu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54363?format=json","vulnerability_id":"VCID-aq6k-yr6s-4ygw","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1472.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1472.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1472","reference_id":"","reference_type":"","scores":[{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89409","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89413","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89424","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89426","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89442","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89445","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89454","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89452","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89448","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89463","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89461","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89476","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.8948","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89481","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04758","scoring_system":"epss","scoring_elements":"0.89488","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1188235","reference_id":"1188235","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1188235"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777197","reference_id":"777197","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777197"},{"reference_url":"https://security.gentoo.org/glsa/201602-02","reference_id":"GLSA-201602-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2199","reference_id":"RHSA-2015:2199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2589","reference_id":"RHSA-2015:2589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2589"},{"reference_url":"https://usn.ubuntu.com/2519-1/","reference_id":"USN-2519-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2519-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923452?format=json","purl":"pkg:deb/debian/glibc@2.19-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-15%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2015-1472"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aq6k-yr6s-4ygw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89833?format=json","vulnerability_id":"VCID-atmj-ekuz-zyg8","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1146.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-1146.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2002-1146","reference_id":"","reference_type":"","scores":[{"value":"0.09717","scoring_system":"epss","scoring_elements":"0.92909","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09717","scoring_system":"epss","scoring_elements":"0.92917","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09717","scoring_system":"epss","scoring_elements":"0.92921","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09717","scoring_system":"epss","scoring_elements":"0.9292","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09717","scoring_system":"epss","scoring_elements":"0.92928","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09717","scoring_system":"epss","scoring_elements":"0.92933","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09717","scoring_system":"epss","scoring_elements":"0.92938","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09717","scoring_system":"epss","scoring_elements":"0.92936","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09717","scoring_system":"epss","scoring_elements":"0.92937","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09717","scoring_system":"epss","scoring_elements":"0.92947","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09717","scoring_system":"epss","scoring_elements":"0.92949","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09717","scoring_system":"epss","scoring_elements":"0.92955","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09717","scoring_system":"epss","scoring_elements":"0.92958","published_at":"2026-04-24T12:55:00Z"},{"value":"0.09717","scoring_system":"epss","scoring_elements":"0.92959","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09717","scoring_system":"epss","scoring_elements":"0.92963","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2002-1146"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1146","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1146"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616843","reference_id":"1616843","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616843"},{"reference_url":"https://access.redhat.com/errata/RHSA-2002:197","reference_id":"RHSA-2002:197","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2002:197"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:022","reference_id":"RHSA-2003:022","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:022"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:212","reference_id":"RHSA-2003:212","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:212"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923413?format=json","purl":"pkg:deb/debian/glibc@2.3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2002-1146"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-atmj-ekuz-zyg8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59737?format=json","vulnerability_id":"VCID-b6tp-a1qc-pfdw","summary":"Multiple vulnerabilities have been found in glibc, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6096.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6096.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6096","reference_id":"","reference_type":"","scores":[{"value":"0.01904","scoring_system":"epss","scoring_elements":"0.8318","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01904","scoring_system":"epss","scoring_elements":"0.83283","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01904","scoring_system":"epss","scoring_elements":"0.83282","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01904","scoring_system":"epss","scoring_elements":"0.83245","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01904","scoring_system":"epss","scoring_elements":"0.83196","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01904","scoring_system":"epss","scoring_elements":"0.8325","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01904","scoring_system":"epss","scoring_elements":"0.83256","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01904","scoring_system":"epss","scoring_elements":"0.8324","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01904","scoring_system":"epss","scoring_elements":"0.83233","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01904","scoring_system":"epss","scoring_elements":"0.8321","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01904","scoring_system":"epss","scoring_elements":"0.83208","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0449","scoring_system":"epss","scoring_elements":"0.89165","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0449","scoring_system":"epss","scoring_elements":"0.89128","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0449","scoring_system":"epss","scoring_elements":"0.89146","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0449","scoring_system":"epss","scoring_elements":"0.89152","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0449","scoring_system":"epss","scoring_elements":"0.89157","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-6096"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6096"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/"}],"url":"https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/10/msg00021.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPYXTDOOB4PQGTYAMZAZNJIB3FF6YQXI/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/URXOIA2LDUKHQXK4BE55BQBRI6ZZG3Y6/"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=25620","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=25620"},{"reference_url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/"}],"url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1820331","reference_id":"1820331","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1820331"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961452","reference_id":"961452","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=961452"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6096","reference_id":"CVE-2020-6096","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-6096"},{"reference_url":"https://security.gentoo.org/glsa/202101-20","reference_id":"GLSA-202101-20","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-02-13T20:06:27Z/"}],"url":"https://security.gentoo.org/glsa/202101-20"},{"reference_url":"https://usn.ubuntu.com/4954-1/","reference_id":"USN-4954-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4954-1/"},{"reference_url":"https://usn.ubuntu.com/5310-1/","reference_id":"USN-5310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923482?format=json","purl":"pkg:deb/debian/glibc@2.31-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2020-6096"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b6tp-a1qc-pfdw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43041?format=json","vulnerability_id":"VCID-bcuy-bbxf-x7hy","summary":"Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33600.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33600.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33600","reference_id":"","reference_type":"","scores":[{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45185","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.4522","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45242","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.4524","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45261","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45229","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45231","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45282","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45276","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00306","scoring_system":"epss","scoring_elements":"0.5373","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.5454","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54534","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54555","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54576","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277204","reference_id":"2277204","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277204"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/07/22/5","reference_id":"5","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/07/22/5"},{"reference_url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0006","reference_id":"GLIBC-SA-2024-0006","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/"}],"url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0006"},{"reference_url":"https://security.gentoo.org/glsa/202405-17","reference_id":"GLSA-202405-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-17"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html","reference_id":"msg00026.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240524-0013/","reference_id":"ntap-20240524-0013","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240524-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2799","reference_id":"RHSA-2024:2799","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2799"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3309","reference_id":"RHSA-2024:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3312","reference_id":"RHSA-2024:3312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3339","reference_id":"RHSA-2024:3339","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3339"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3344","reference_id":"RHSA-2024:3344","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3411","reference_id":"RHSA-2024:3411","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3411"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3423","reference_id":"RHSA-2024:3423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3464","reference_id":"RHSA-2024:3464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3588","reference_id":"RHSA-2024:3588","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4126","reference_id":"RHSA-2024:4126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4126"},{"reference_url":"https://usn.ubuntu.com/6804-1/","reference_id":"USN-6804-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6804-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923504?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923503?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923505?format=json","purl":"pkg:deb/debian/glibc@2.37-19?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.37-19%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2024-33600"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bcuy-bbxf-x7hy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/40282?format=json","vulnerability_id":"VCID-bfkj-w1s6-67bc","summary":"glibc contains an information leak vulnerability allowing the debugging of\n    SUID binaries.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1453.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1453.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-1453","reference_id":"","reference_type":"","scores":[{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.2313","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23305","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23348","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23137","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.2321","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23261","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23283","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23245","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23187","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23204","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23197","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23157","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22985","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22978","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22974","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.22867","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-1453"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1453","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1453"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617412","reference_id":"1617412","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617412"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=272210","reference_id":"272210","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=272210"},{"reference_url":"https://security.gentoo.org/glsa/200408-16","reference_id":"GLSA-200408-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200408-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:256","reference_id":"RHSA-2005:256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:261","reference_id":"RHSA-2005:261","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:261"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923417?format=json","purl":"pkg:deb/debian/glibc@2.3.5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.3.5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2004-1453"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bfkj-w1s6-67bc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43042?format=json","vulnerability_id":"VCID-bsue-bznw-1ffe","summary":"Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33601.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33601.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33601","reference_id":"","reference_type":"","scores":[{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28367","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28523","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28566","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28433","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28476","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28479","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28436","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28387","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28401","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28379","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33729","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.3451","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34598","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34852","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34618","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277205","reference_id":"2277205","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277205"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/07/22/5","reference_id":"5","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/07/22/5"},{"reference_url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007","reference_id":"GLIBC-SA-2024-0007","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/"}],"url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007"},{"reference_url":"https://security.gentoo.org/glsa/202405-17","reference_id":"GLSA-202405-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-17"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html","reference_id":"msg00026.html","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240524-0014/","reference_id":"ntap-20240524-0014","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240524-0014/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2799","reference_id":"RHSA-2024:2799","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2799"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3309","reference_id":"RHSA-2024:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3312","reference_id":"RHSA-2024:3312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3339","reference_id":"RHSA-2024:3339","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3339"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3344","reference_id":"RHSA-2024:3344","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3411","reference_id":"RHSA-2024:3411","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3411"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3423","reference_id":"RHSA-2024:3423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3464","reference_id":"RHSA-2024:3464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3588","reference_id":"RHSA-2024:3588","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4126","reference_id":"RHSA-2024:4126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4126"},{"reference_url":"https://usn.ubuntu.com/6804-1/","reference_id":"USN-6804-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6804-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923504?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923503?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923505?format=json","purl":"pkg:deb/debian/glibc@2.37-19?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.37-19%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2024-33601"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bsue-bznw-1ffe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61766?format=json","vulnerability_id":"VCID-byqx-z785-6qcq","summary":"Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4412.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4412.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4412","reference_id":"","reference_type":"","scores":[{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95243","published_at":"2026-04-01T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95255","published_at":"2026-04-02T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95258","published_at":"2026-04-04T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95262","published_at":"2026-04-07T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.9527","published_at":"2026-04-08T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95272","published_at":"2026-04-09T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95277","published_at":"2026-04-11T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95278","published_at":"2026-04-12T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95281","published_at":"2026-04-13T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95289","published_at":"2026-04-16T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95293","published_at":"2026-04-18T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95296","published_at":"2026-04-21T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95297","published_at":"2026-04-24T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95299","published_at":"2026-04-29T12:55:00Z"},{"value":"0.18703","scoring_system":"epss","scoring_elements":"0.95311","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4412"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687530","reference_id":"687530","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=687530"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=855385","reference_id":"855385","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=855385"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/37783.c","reference_id":"CVE-2012-4412;OSVDB-98142","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/37783.c"},{"reference_url":"https://www.securityfocus.com/bid/55462/info","reference_id":"CVE-2012-4412;OSVDB-98142","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/55462/info"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://usn.ubuntu.com/1991-1/","reference_id":"USN-1991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1991-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923439?format=json","purl":"pkg:deb/debian/glibc@2.17-94?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.17-94%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2012-4412"],"risk_score":0.4,"exploitability":"2.0","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-byqx-z785-6qcq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48726?format=json","vulnerability_id":"VCID-c2yx-a4d3-q7d8","summary":"Multiple vulnerabilities were found in glibc, the worst of which allowing\n    local attackers to execute arbitrary code as root.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4880.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4880.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4880","reference_id":"","reference_type":"","scores":[{"value":"0.12962","scoring_system":"epss","scoring_elements":"0.941","published_at":"2026-05-05T12:55:00Z"},{"value":"0.12962","scoring_system":"epss","scoring_elements":"0.9403","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12962","scoring_system":"epss","scoring_elements":"0.9404","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12962","scoring_system":"epss","scoring_elements":"0.94051","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12962","scoring_system":"epss","scoring_elements":"0.94054","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12962","scoring_system":"epss","scoring_elements":"0.94062","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12962","scoring_system":"epss","scoring_elements":"0.94066","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12962","scoring_system":"epss","scoring_elements":"0.94071","published_at":"2026-04-13T12:55:00Z"},{"value":"0.12962","scoring_system":"epss","scoring_elements":"0.94087","published_at":"2026-04-16T12:55:00Z"},{"value":"0.12962","scoring_system":"epss","scoring_elements":"0.94092","published_at":"2026-04-18T12:55:00Z"},{"value":"0.12962","scoring_system":"epss","scoring_elements":"0.94091","published_at":"2026-04-21T12:55:00Z"},{"value":"0.12962","scoring_system":"epss","scoring_elements":"0.94093","published_at":"2026-04-24T12:55:00Z"},{"value":"0.12962","scoring_system":"epss","scoring_elements":"0.94094","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4880"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4880","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4880"},{"reference_url":"http://secunia.com/advisories/39900","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/39900"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201011-01.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201011-01.xml"},{"reference_url":"http://securityreason.com/achievement_securityalert/67","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/achievement_securityalert/67"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/59242","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/59242"},{"reference_url":"http://sources.redhat.com/bugzilla/show_bug.cgi?id=10600","reference_id":"","reference_type":"","scores":[],"url":"http://sources.redhat.com/bugzilla/show_bug.cgi?id=10600"},{"reference_url":"http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=199eb0de8d673fb23aa127721054b4f1803d61f3","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=199eb0de8d673fb23aa127721054b4f1803d61f3"},{"reference_url":"http://www.debian.org/security/2010/dsa-2058","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2058"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:111","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:111"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:112","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:112"},{"reference_url":"http://www.securityfocus.com/bid/36443","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/36443"},{"reference_url":"http://www.ubuntu.com/usn/USN-944-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-944-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1246","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1246"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=599070","reference_id":"599070","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=599070"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-4880","reference_id":"CVE-2009-4880","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-4880"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33230.txt","reference_id":"CVE-2009-4880;OSVDB-65080","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/33230.txt"},{"reference_url":"https://www.securityfocus.com/bid/36443/info","reference_id":"CVE-2009-4880;OSVDB-65080","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/36443/info"},{"reference_url":"https://security.gentoo.org/glsa/201011-01","reference_id":"GLSA-201011-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201011-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923425?format=json","purl":"pkg:deb/debian/glibc@2.11.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.11.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2009-4880"],"risk_score":9.0,"exploitability":"2.0","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c2yx-a4d3-q7d8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61414?format=json","vulnerability_id":"VCID-c4w6-89qu-xkev","summary":"Multiple vulnerabilities have been found in glibc, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7309.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-7309.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-7309","reference_id":"","reference_type":"","scores":[{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37601","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37765","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37783","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37809","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37687","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.37738","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00166","scoring_system":"epss","scoring_elements":"0.3775","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44121","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44203","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44304","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44303","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.4436","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44351","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.4428","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.442","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-7309"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7309","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7309"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=24155","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=24155"},{"reference_url":"https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/ml/libc-alpha/2019-02/msg00041.html"},{"reference_url":"http://www.securityfocus.com/bid/106835","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/106835"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1672232","reference_id":"1672232","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1672232"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x86:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x86:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:x86:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-7309","reference_id":"CVE-2019-7309","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-7309"},{"reference_url":"https://security.gentoo.org/glsa/202006-04","reference_id":"GLSA-202006-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202006-04"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923459?format=json","purl":"pkg:deb/debian/glibc@2.28-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2019-7309"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c4w6-89qu-xkev"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48731?format=json","vulnerability_id":"VCID-cktt-pktd-ffat","summary":"Multiple vulnerabilities were found in glibc, the worst of which allowing\n    local attackers to execute arbitrary code as root.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3847.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3847.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3847","reference_id":"","reference_type":"","scores":[{"value":"0.04983","scoring_system":"epss","scoring_elements":"0.89652","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11264","scoring_system":"epss","scoring_elements":"0.93491","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11264","scoring_system":"epss","scoring_elements":"0.93499","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11264","scoring_system":"epss","scoring_elements":"0.93506","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11264","scoring_system":"epss","scoring_elements":"0.93509","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11264","scoring_system":"epss","scoring_elements":"0.93515","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11264","scoring_system":"epss","scoring_elements":"0.93514","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11264","scoring_system":"epss","scoring_elements":"0.93534","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11264","scoring_system":"epss","scoring_elements":"0.9354","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11264","scoring_system":"epss","scoring_elements":"0.93547","published_at":"2026-04-21T12:55:00Z"},{"value":"0.11264","scoring_system":"epss","scoring_elements":"0.93551","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11264","scoring_system":"epss","scoring_elements":"0.93549","published_at":"2026-04-26T12:55:00Z"},{"value":"0.11264","scoring_system":"epss","scoring_elements":"0.93548","published_at":"2026-04-29T12:55:00Z"},{"value":"0.11264","scoring_system":"epss","scoring_elements":"0.93555","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3847"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3847","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3847"},{"reference_url":"http://seclists.org/fulldisclosure/2010/Oct/257","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2010/Oct/257"},{"reference_url":"http://seclists.org/fulldisclosure/2010/Oct/292","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2010/Oct/292"},{"reference_url":"http://seclists.org/fulldisclosure/2010/Oct/294","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2010/Oct/294"},{"reference_url":"http://secunia.com/advisories/42787","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42787"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201011-01.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201011-01.xml"},{"reference_url":"https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html"},{"reference_url":"http://sourceware.org/ml/libc-hacker/2010-10/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/ml/libc-hacker/2010-10/msg00007.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0787.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0787.html"},{"reference_url":"http://support.avaya.com/css/P8/documents/100120941","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/css/P8/documents/100120941"},{"reference_url":"https://www.exploit-db.com/exploits/44024/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/44024/"},{"reference_url":"https://www.exploit-db.com/exploits/44025/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/44025/"},{"reference_url":"http://www.debian.org/security/2010/dsa-2122","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2122"},{"reference_url":"http://www.kb.cert.org/vuls/id/537223","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/537223"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:207","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:207"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0872.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0872.html"},{"reference_url":"http://www.securityfocus.com/archive/1/515545/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/515545/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/44154","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/44154"},{"reference_url":"http://www.ubuntu.com/usn/USN-1009-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1009-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0001.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0001.html"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0025","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0025"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=643306","reference_id":"643306","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=643306"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44024.rb","reference_id":"CVE-2010-3847","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44024.rb"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3847","reference_id":"CVE-2010-3847","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3847"},{"reference_url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/add7ae8fa18f689ff7e41057bc5bd51fdc8eaa5e/modules/exploits/linux/local/glibc_origin_expansion_priv_esc.rb","reference_id":"CVE-2010-3847","reference_type":"exploit","scores":[],"url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/add7ae8fa18f689ff7e41057bc5bd51fdc8eaa5e/modules/exploits/linux/local/glibc_origin_expansion_priv_esc.rb"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44025.rb","reference_id":"CVE-2010-3856;CVE-2010-3847","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44025.rb"},{"reference_url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/cb1b59545b1378be9e781787b028fee03d734f58/modules/exploits/linux/local/glibc_ld_audit_dso_load_priv_esc.rb","reference_id":"CVE-2010-3856;CVE-2010-3847","reference_type":"exploit","scores":[],"url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/cb1b59545b1378be9e781787b028fee03d734f58/modules/exploits/linux/local/glibc_ld_audit_dso_load_priv_esc.rb"},{"reference_url":"http://marc.info/?l=full-disclosure&m=128776663124692&w=2","reference_id":"CVE-2010-3856;OSVDB-68920;CVE-2010-3847","reference_type":"exploit","scores":[],"url":"http://marc.info/?l=full-disclosure&m=128776663124692&w=2"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/15304.txt","reference_id":"CVE-2010-3856;OSVDB-68920;CVE-2010-3847","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/15304.txt"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/15274.txt","reference_id":"CVE-2011-0536;OSVDB-68721;CVE-2010-3847","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/15274.txt"},{"reference_url":"https://security.gentoo.org/glsa/201011-01","reference_id":"GLSA-201011-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201011-01"},{"reference_url":"https://security.gentoo.org/glsa/201312-01","reference_id":"GLSA-201312-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0787","reference_id":"RHSA-2010:0787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0872","reference_id":"RHSA-2010:0872","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0872"},{"reference_url":"https://usn.ubuntu.com/1009-1/","reference_id":"USN-1009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1009-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923430?format=json","purl":"pkg:deb/debian/glibc@2.11.2-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.11.2-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2010-3847"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cktt-pktd-ffat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57210?format=json","vulnerability_id":"VCID-cs4a-sme5-7yha","summary":"Multiple vulnerabilities have been found in GNU C Library, the\n    worst of which allowing arbitrary code execution and privilege escalation.","references":[{"reference_url":"http://lists.debian.org/debian-security-announce/2011/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.debian.org/debian-security-announce/2011/msg00005.html"},{"reference_url":"http://openwall.com/lists/oss-security/2011/02/01/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/02/01/3"},{"reference_url":"http://openwall.com/lists/oss-security/2011/02/03/2","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/02/03/2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0536.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0536.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0536","reference_id":"","reference_type":"","scores":[{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.5147","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.5148","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51532","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51559","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51519","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51573","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.5157","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.5162","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51599","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51582","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51624","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51631","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51609","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.5156","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51566","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00282","scoring_system":"epss","scoring_elements":"0.51526","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0536"},{"reference_url":"http://secunia.com/advisories/43830","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43830"},{"reference_url":"http://secunia.com/advisories/43989","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43989"},{"reference_url":"http://secunia.com/advisories/46397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/46397"},{"reference_url":"http://securitytracker.com/id?1025289","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1025289"},{"reference_url":"https://launchpad.net/bugs/701783","reference_id":"","reference_type":"","scores":[],"url":"https://launchpad.net/bugs/701783"},{"reference_url":"http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=96611391ad8823ba58405325d78cefeae5cdf699","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=96611391ad8823ba58405325d78cefeae5cdf699"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13086","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13086"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:178","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:178"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0412.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0412.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0413.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0413.html"},{"reference_url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded"},{"reference_url":"http://www.ubuntu.com/usn/USN-1009-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1009-2"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0863","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0863"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=667974","reference_id":"667974","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=667974"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12-1.7.el6_0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12-1.7.el6_0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12-1.7.el6_0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5-49.el5_5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.5-49.el5_5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5-49.el5_5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0536","reference_id":"CVE-2011-0536","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0536"},{"reference_url":"https://security.gentoo.org/glsa/201312-01","reference_id":"GLSA-201312-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0412","reference_id":"RHSA-2011:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0413","reference_id":"RHSA-2011:0413","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0413"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923418?format=json","purl":"pkg:deb/debian/glibc@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2011-0536"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cs4a-sme5-7yha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31487?format=json","vulnerability_id":"VCID-cv87-rxmr-cqhn","summary":"Multiple vulnerabilities have been found in glibc, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15671.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15671.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15671","reference_id":"","reference_type":"","scores":[{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45698","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45928","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45898","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45957","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45952","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45897","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45846","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45856","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45799","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45852","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45908","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00231","scoring_system":"epss","scoring_elements":"0.45905","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.6081","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60737","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00403","scoring_system":"epss","scoring_elements":"0.60839","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15671"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22325","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22325"},{"reference_url":"http://www.securityfocus.com/bid/101517","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101517"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1504806","reference_id":"1504806","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1504806"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879500","reference_id":"879500","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879500"},{"reference_url":"https://security.archlinux.org/ASA-201801-8","reference_id":"ASA-201801-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-8"},{"reference_url":"https://security.archlinux.org/ASA-201801-9","reference_id":"ASA-201801-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-9"},{"reference_url":"https://security.archlinux.org/AVG-460","reference_id":"AVG-460","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-460"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15671","reference_id":"CVE-2017-15671","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15671"},{"reference_url":"https://security.gentoo.org/glsa/201804-02","reference_id":"GLSA-201804-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-02"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923469?format=json","purl":"pkg:deb/debian/glibc@2.25-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.25-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2017-15671"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cv87-rxmr-cqhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58067?format=json","vulnerability_id":"VCID-d1zs-8tg7-byhe","summary":"security update","references":[{"reference_url":"http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html","reference_id":"","reference_type":"","scores":[],"url":"http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8777.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8777.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8777","reference_id":"","reference_type":"","scores":[{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18743","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18791","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18879","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18932","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18654","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18733","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18787","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18745","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18695","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18644","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20925","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21072","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2105","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20923","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20892","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20784","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8777"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:S/C:P/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=18928","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=18928"},{"reference_url":"http://www.debian.org/security/2016/dsa-3480","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3480"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/20/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/20/1"},{"reference_url":"http://www.securityfocus.com/bid/81469","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/81469"},{"reference_url":"http://www.securitytracker.com/id/1034811","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034811"},{"reference_url":"http://www.ubuntu.com/usn/USN-2985-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2985-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2985-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2985-2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1260581","reference_id":"1260581","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1260581"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798316","reference_id":"798316","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798316"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8777","reference_id":"CVE-2015-8777","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:P/A:N"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8777"},{"reference_url":"https://security.gentoo.org/glsa/201702-11","reference_id":"GLSA-201702-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201702-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1916","reference_id":"RHSA-2017:1916","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1916"},{"reference_url":"https://usn.ubuntu.com/2985-1/","reference_id":"USN-2985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2985-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923442?format=json","purl":"pkg:deb/debian/glibc@2.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2015-8777"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d1zs-8tg7-byhe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43044?format=json","vulnerability_id":"VCID-d5xx-af6p-2fhn","summary":"Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4802.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4802.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-4802","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13253","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12907","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13033","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1313","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13135","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13105","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13003","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13319","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13117","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13198","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13249","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13218","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13181","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13129","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13031","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-4802"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4802","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4802"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2367468","reference_id":"2367468","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2367468"},{"reference_url":"https://security.gentoo.org/glsa/202509-04","reference_id":"GLSA-202509-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202509-04"},{"reference_url":"https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e","reference_id":"?id=1e18586c5820e329f741d5c710275e165581380e","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-20T13:47:23Z/"}],"url":"https://sourceware.org/cgit/glibc/commit/?id=1e18586c5820e329f741d5c710275e165581380e"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10219","reference_id":"RHSA-2025:10219","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10219"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10220","reference_id":"RHSA-2025:10220","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10220"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10294","reference_id":"RHSA-2025:10294","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10294"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11487","reference_id":"RHSA-2025:11487","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11487"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8655","reference_id":"RHSA-2025:8655","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8655"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8686","reference_id":"RHSA-2025:8686","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8686"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9028","reference_id":"RHSA-2025:9028","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9028"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9336","reference_id":"RHSA-2025:9336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9336"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9725","reference_id":"RHSA-2025:9725","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9725"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9750","reference_id":"RHSA-2025:9750","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9750"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32976","reference_id":"show_bug.cgi?id=32976","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-20T13:47:23Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32976"},{"reference_url":"https://usn.ubuntu.com/7541-1/","reference_id":"USN-7541-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7541-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923511?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923510?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u11?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923512?format=json","purl":"pkg:deb/debian/glibc@2.39-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.39-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2025-4802"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d5xx-af6p-2fhn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62167?format=json","vulnerability_id":"VCID-dgmx-612a-eqfq","summary":"Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38604.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-38604.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-38604","reference_id":"","reference_type":"","scores":[{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28049","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28077","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27968","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27985","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27977","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28034","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28164","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.2796","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28028","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.2807","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28121","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27478","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27649","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27723","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27834","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27919","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-38604"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1993517","reference_id":"1993517","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1993517"},{"reference_url":"https://security.archlinux.org/AVG-2293","reference_id":"AVG-2293","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2293"},{"reference_url":"https://security.gentoo.org/glsa/202208-24","reference_id":"GLSA-202208-24","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:18:15Z/"}],"url":"https://security.gentoo.org/glsa/202208-24"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/","reference_id":"GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:18:15Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GYEXYM37RCJWJ6B5KQUYQI4NZBDDYSXP/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210909-0005/","reference_id":"ntap-20210909-0005","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:18:15Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210909-0005/"},{"reference_url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=4cc79c217744743077bf7a0ec5e0a4318f1e6641","reference_id":"?p=glibc.git%3Ba=commit%3Bh=4cc79c217744743077bf7a0ec5e0a4318f1e6641","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:18:15Z/"}],"url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=4cc79c217744743077bf7a0ec5e0a4318f1e6641"},{"reference_url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=b805aebd42364fe696e417808a700fdb9800c9e8","reference_id":"?p=glibc.git%3Ba=commit%3Bh=b805aebd42364fe696e417808a700fdb9800c9e8","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:18:15Z/"}],"url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=b805aebd42364fe696e417808a700fdb9800c9e8"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=28213","reference_id":"show_bug.cgi?id=28213","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:18:15Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=28213"},{"reference_url":"https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc","reference_id":"tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-30T19:18:15Z/"}],"url":"https://blog.tuxcare.com/cve/tuxcare-team-identifies-cve-2021-38604-a-new-vulnerability-in-glibc"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923418?format=json","purl":"pkg:deb/debian/glibc@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2021-38604"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dgmx-612a-eqfq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43779?format=json","vulnerability_id":"VCID-dqgn-fdxt-u3cc","summary":"Multiple vulnerabilities in glibc could result in Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3326.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3326.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3326","reference_id":"","reference_type":"","scores":[{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38057","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38471","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38494","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38548","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38501","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38527","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38565","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38554","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38631","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38545","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38607","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38171","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38263","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38288","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00172","scoring_system":"epss","scoring_elements":"0.38447","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3326"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3326"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1921916","reference_id":"1921916","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1921916"},{"reference_url":"http://www.openwall.com/lists/oss-security/2021/01/28/2","reference_id":"2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/"}],"url":"http://www.openwall.com/lists/oss-security/2021/01/28/2"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981198","reference_id":"981198","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981198"},{"reference_url":"https://security.archlinux.org/ASA-202102-16","reference_id":"ASA-202102-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202102-16"},{"reference_url":"https://security.archlinux.org/ASA-202102-17","reference_id":"ASA-202102-17","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202102-17"},{"reference_url":"https://security.archlinux.org/AVG-1320","reference_id":"AVG-1320","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1320"},{"reference_url":"https://security.gentoo.org/glsa/202107-07","reference_id":"GLSA-202107-07","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/"}],"url":"https://security.gentoo.org/glsa/202107-07"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210304-0007/","reference_id":"ntap-20210304-0007","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210304-0007/"},{"reference_url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=7d88c6142c6efc160c0ee5e4f85cde382c072888","reference_id":"?p=glibc.git%3Ba=commit%3Bh=7d88c6142c6efc160c0ee5e4f85cde382c072888","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/"}],"url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=7d88c6142c6efc160c0ee5e4f85cde382c072888"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1585","reference_id":"RHSA-2021:1585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1585"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=27256","reference_id":"show_bug.cgi?id=27256","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:17:18Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=27256"},{"reference_url":"https://usn.ubuntu.com/5310-1/","reference_id":"USN-5310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-1/"},{"reference_url":"https://usn.ubuntu.com/5699-1/","reference_id":"USN-5699-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5699-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923483?format=json","purl":"pkg:deb/debian/glibc@2.31-10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2021-3326"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dqgn-fdxt-u3cc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71954?format=json","vulnerability_id":"VCID-duv1-qtpd-ybdg","summary":"glibc: vDSO getrandom acceleration may return predictable randomness","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0577.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0577.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0577","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01722","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01436","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01451","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01538","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01546","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01544","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01758","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03336","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03313","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03365","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.0354","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03554","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03563","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03564","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00016","scoring_system":"epss","scoring_elements":"0.03586","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0577"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2338871","reference_id":"2338871","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2338871"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923418?format=json","purl":"pkg:deb/debian/glibc@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2025-0577"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-duv1-qtpd-ybdg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83686?format=json","vulnerability_id":"VCID-e27x-ufvw-cyec","summary":"glibc: Integer overflow in stdlib/canonicalize.c on 32-bit architectures leading to stack-based buffer overflow","references":[{"reference_url":"https://access.redhat.com/errata/RHBA-2019:0327","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHBA-2019:0327"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11236.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11236.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-11236","reference_id":"","reference_type":"","scores":[{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76503","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76646","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76595","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76627","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76633","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76508","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76537","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.7652","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76552","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76563","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76589","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76568","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76561","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76603","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00965","scoring_system":"epss","scoring_elements":"0.76607","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-11236"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11236","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11236"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190329-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190329-0001/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190401-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190401-0001/"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22786","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22786"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=5460617d1567657621107d895ee2dd83bc1f88f2","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=5460617d1567657621107d895ee2dd83bc1f88f2"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"reference_url":"http://www.securityfocus.com/bid/104255","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/104255"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1581269","reference_id":"1581269","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1581269"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=899071","reference_id":"899071","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=899071"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11236","reference_id":"CVE-2018-11236","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11236"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3092","reference_id":"RHSA-2018:3092","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3092"},{"reference_url":"https://usn.ubuntu.com/4416-1/","reference_id":"USN-4416-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4416-1/"},{"reference_url":"https://usn.ubuntu.com/6762-1/","reference_id":"USN-6762-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6762-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923473?format=json","purl":"pkg:deb/debian/glibc@2.27-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.27-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2018-11236"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e27x-ufvw-cyec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89711?format=json","vulnerability_id":"VCID-e6xr-13c6-7uf9","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0689.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0689.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0689","reference_id":"","reference_type":"","scores":[{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75473","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75476","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75507","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75487","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75529","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75538","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75559","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75528","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75571","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75577","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75563","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75601","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.75606","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.7561","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00891","scoring_system":"epss","scoring_elements":"0.7562","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0689"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0689","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0689"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617066","reference_id":"1617066","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:249","reference_id":"RHSA-2003:249","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:249"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:325","reference_id":"RHSA-2003:325","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:325"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923415?format=json","purl":"pkg:deb/debian/glibc@2.2.5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.2.5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2003-0689"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e6xr-13c6-7uf9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54412?format=json","vulnerability_id":"VCID-e9fg-s2r5-qfc2","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6656.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6656.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6656","reference_id":"","reference_type":"","scores":[{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79069","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.7893","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78936","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78964","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78948","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78972","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78978","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79002","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78987","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.78976","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79004","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79001","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79032","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79038","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01208","scoring_system":"epss","scoring_elements":"0.79053","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=14134","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=14134"},{"reference_url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=6e230d11837f3ae7b375ea69d7905f0d18eb79e5","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=6e230d11837f3ae7b375ea69d7905f0d18eb79e5"},{"reference_url":"http://www.debian.org/security/2015/dsa-3142","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3142"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:175","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:175"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/08/29/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/08/29/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/09/02/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/09/02/1"},{"reference_url":"http://www.securityfocus.com/bid/69472","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/69472"},{"reference_url":"http://www.ubuntu.com/usn/USN-2432-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2432-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1135840","reference_id":"1135840","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1135840"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6656","reference_id":"CVE-2012-6656","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6656"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://usn.ubuntu.com/2432-1/","reference_id":"USN-2432-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2432-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923440?format=json","purl":"pkg:deb/debian/glibc@2.17-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.17-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2012-6656"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e9fg-s2r5-qfc2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39605?format=json","vulnerability_id":"VCID-edpa-k13r-uken","summary":"Multiple vulnerabilities have been found in the GNU C Library, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6323.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6323.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6323","reference_id":"","reference_type":"","scores":[{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78293","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.783","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.7833","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78313","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78339","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78345","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78371","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78354","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78347","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78376","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78375","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78372","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78406","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78413","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.7843","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78443","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6323"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6323","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6323"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.5","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1383297","reference_id":"1383297","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1383297"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834752","reference_id":"834752","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=834752"},{"reference_url":"https://security.gentoo.org/glsa/201706-19","reference_id":"GLSA-201706-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-19"},{"reference_url":"https://usn.ubuntu.com/3239-1/","reference_id":"USN-3239-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3239-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923464?format=json","purl":"pkg:deb/debian/glibc@2.24-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.24-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2016-6323"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-edpa-k13r-uken"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49147?format=json","vulnerability_id":"VCID-et4n-9tuq-k3ct","summary":"Multiple vulnerabilities in glibc could result in Local Privilege Escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6246.json","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6246.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6246","reference_id":"","reference_type":"","scores":[{"value":"0.25481","scoring_system":"epss","scoring_elements":"0.96247","published_at":"2026-05-05T12:55:00Z"},{"value":"0.25481","scoring_system":"epss","scoring_elements":"0.96219","published_at":"2026-04-12T12:55:00Z"},{"value":"0.25481","scoring_system":"epss","scoring_elements":"0.96221","published_at":"2026-04-13T12:55:00Z"},{"value":"0.25481","scoring_system":"epss","scoring_elements":"0.96229","published_at":"2026-04-16T12:55:00Z"},{"value":"0.25481","scoring_system":"epss","scoring_elements":"0.96233","published_at":"2026-04-18T12:55:00Z"},{"value":"0.25481","scoring_system":"epss","scoring_elements":"0.96234","published_at":"2026-04-21T12:55:00Z"},{"value":"0.25481","scoring_system":"epss","scoring_elements":"0.96235","published_at":"2026-04-24T12:55:00Z"},{"value":"0.25481","scoring_system":"epss","scoring_elements":"0.96236","published_at":"2026-04-26T12:55:00Z"},{"value":"0.25481","scoring_system":"epss","scoring_elements":"0.96238","published_at":"2026-04-29T12:55:00Z"},{"value":"0.26964","scoring_system":"epss","scoring_elements":"0.96348","published_at":"2026-04-07T12:55:00Z"},{"value":"0.26964","scoring_system":"epss","scoring_elements":"0.9634","published_at":"2026-04-02T12:55:00Z"},{"value":"0.26964","scoring_system":"epss","scoring_elements":"0.9636","published_at":"2026-04-09T12:55:00Z"},{"value":"0.26964","scoring_system":"epss","scoring_elements":"0.96356","published_at":"2026-04-08T12:55:00Z"},{"value":"0.26964","scoring_system":"epss","scoring_elements":"0.96344","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6246"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2249053","reference_id":"2249053","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-02-09T05:00:28Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2249053"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Feb/3","reference_id":"3","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-02-09T05:00:28Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Feb/3"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Feb/5","reference_id":"5","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-02-09T05:00:28Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Feb/5"},{"reference_url":"https://www.openwall.com/lists/oss-security/2024/01/30/6","reference_id":"6","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-02-09T05:00:28Z/"}],"url":"https://www.openwall.com/lists/oss-security/2024/01/30/6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-6246","reference_id":"CVE-2023-6246","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-02-09T05:00:28Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-6246"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/","reference_id":"D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-02-09T05:00:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/"},{"reference_url":"http://packetstormsecurity.com/files/176931/glibc-qsort-Out-Of-Bounds-Read-Write.html","reference_id":"glibc-qsort-Out-Of-Bounds-Read-Write.html","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-02-09T05:00:28Z/"}],"url":"http://packetstormsecurity.com/files/176931/glibc-qsort-Out-Of-Bounds-Read-Write.html"},{"reference_url":"http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html","reference_id":"glibc-syslog-Heap-Based-Buffer-Overflow.html","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-02-09T05:00:28Z/"}],"url":"http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html"},{"reference_url":"https://security.gentoo.org/glsa/202402-01","reference_id":"GLSA-202402-01","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-02-09T05:00:28Z/"}],"url":"https://security.gentoo.org/glsa/202402-01"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/","reference_id":"MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-02-09T05:00:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240216-0007/","reference_id":"ntap-20240216-0007","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-02-09T05:00:28Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240216-0007/"},{"reference_url":"https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt","reference_id":"syslog.txt","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-02-09T05:00:28Z/"}],"url":"https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt"},{"reference_url":"https://usn.ubuntu.com/6620-1/","reference_id":"USN-6620-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6620-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923418?format=json","purl":"pkg:deb/debian/glibc@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923498?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923499?format=json","purl":"pkg:deb/debian/glibc@2.37-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.37-15%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2023-6246"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-et4n-9tuq-k3ct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82700?format=json","vulnerability_id":"VCID-evbv-ckb4-yybq","summary":"glibc: parse_reg_exp in posix/regcomp.c misparses alternatives leading to denial of service or trigger incorrect result","references":[{"reference_url":"http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/cgit/gnulib.git/commit/?id=5513b40999149090987a0341c018d05d3eea1272"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-5155.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-5155.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-5155","reference_id":"","reference_type":"","scores":[{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80034","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80178","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80141","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80149","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80164","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80041","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80062","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80051","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80079","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80087","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80107","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80091","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80083","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80111","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80112","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01348","scoring_system":"epss","scoring_elements":"0.80113","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-5155"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5155"},{"reference_url":"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793","reference_id":"","reference_type":"","scores":[],"url":"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=22793"},{"reference_url":"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806","reference_id":"","reference_type":"","scores":[],"url":"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=32806"},{"reference_url":"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238","reference_id":"","reference_type":"","scores":[],"url":"https://debbugs.gnu.org/cgi/bugreport.cgi?bug=34238"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190315-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190315-0002/"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=11053","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=11053"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=18986","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=18986"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=eb04c21373e2a2885f3d52ff192b0499afe3c672","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=eb04c21373e2a2885f3d52ff192b0499afe3c672"},{"reference_url":"https://support.f5.com/csp/article/K64119434","reference_id":"","reference_type":"","scores":[],"url":"https://support.f5.com/csp/article/K64119434"},{"reference_url":"https://support.f5.com/csp/article/K64119434?utm_source=f5support&amp%3Butm_medium=RSS","reference_id":"","reference_type":"","scores":[],"url":"https://support.f5.com/csp/article/K64119434?utm_source=f5support&amp%3Butm_medium=RSS"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1683683","reference_id":"1683683","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1683683"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924613","reference_id":"924613","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924613"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-5155","reference_id":"CVE-2009-5155","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-5155"},{"reference_url":"https://usn.ubuntu.com/4954-1/","reference_id":"USN-4954-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4954-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923428?format=json","purl":"pkg:deb/debian/glibc@2.28-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2009-5155"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-evbv-ckb4-yybq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48732?format=json","vulnerability_id":"VCID-f7mh-4xkf-7fha","summary":"Multiple vulnerabilities were found in glibc, the worst of which allowing\n    local attackers to execute arbitrary code as root.","references":[{"reference_url":"http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html"},{"reference_url":"http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3856.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-3856.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3856","reference_id":"","reference_type":"","scores":[{"value":"0.05279","scoring_system":"epss","scoring_elements":"0.89962","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0894","scoring_system":"epss","scoring_elements":"0.9256","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0894","scoring_system":"epss","scoring_elements":"0.92567","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0894","scoring_system":"epss","scoring_elements":"0.92569","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0894","scoring_system":"epss","scoring_elements":"0.9258","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0894","scoring_system":"epss","scoring_elements":"0.92585","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0894","scoring_system":"epss","scoring_elements":"0.92591","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0894","scoring_system":"epss","scoring_elements":"0.9259","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0894","scoring_system":"epss","scoring_elements":"0.92604","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0894","scoring_system":"epss","scoring_elements":"0.92603","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0894","scoring_system":"epss","scoring_elements":"0.92607","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0894","scoring_system":"epss","scoring_elements":"0.92609","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0894","scoring_system":"epss","scoring_elements":"0.92605","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0894","scoring_system":"epss","scoring_elements":"0.92614","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-3856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3856"},{"reference_url":"http://seclists.org/fulldisclosure/2010/Oct/344","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2010/Oct/344"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jun/18","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jun/18"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Jul/31","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2023/Jul/31"},{"reference_url":"http://secunia.com/advisories/42787","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42787"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201011-01.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201011-01.xml"},{"reference_url":"https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html"},{"reference_url":"http://sourceware.org/ml/libc-hacker/2010-10/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/ml/libc-hacker/2010-10/msg00010.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2010-0793.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2010-0793.html"},{"reference_url":"https://seclists.org/bugtraq/2019/Jun/14","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jun/14"},{"reference_url":"http://support.avaya.com/css/P8/documents/100121017","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/css/P8/documents/100121017"},{"reference_url":"https://www.exploit-db.com/exploits/44025/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/44025/"},{"reference_url":"http://www.debian.org/security/2010/dsa-2122","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2122"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:212","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:212"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/07/19/9","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2023/07/19/9"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/07/20/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2023/07/20/1"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2010-0872.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2010-0872.html"},{"reference_url":"http://www.securityfocus.com/archive/1/515545/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/515545/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/44347","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/44347"},{"reference_url":"http://www.ubuntu.com/usn/USN-1009-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1009-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0001.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0001.html"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0025","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0025"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=645672","reference_id":"645672","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=645672"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3856","reference_id":"CVE-2010-3856","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-3856"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/18105.sh","reference_id":"CVE-2010-3856;OSVDB-68920","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/18105.sh"},{"reference_url":"https://security.gentoo.org/glsa/201011-01","reference_id":"GLSA-201011-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201011-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0793","reference_id":"RHSA-2010:0793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0793"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0872","reference_id":"RHSA-2010:0872","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0872"},{"reference_url":"https://usn.ubuntu.com/1009-1/","reference_id":"USN-1009-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1009-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923430?format=json","purl":"pkg:deb/debian/glibc@2.11.2-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.11.2-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2010-3856"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f7mh-4xkf-7fha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61188?format=json","vulnerability_id":"VCID-f7vd-cpza-xfcx","summary":"Multiple vulnerabilities have been found in the GNU C Library, the\n    worst of which allows context-dependent attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-06/msg00030.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-07/msg00039.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2573.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2573.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3075.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3075.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3075","reference_id":"","reference_type":"","scores":[{"value":"0.10879","scoring_system":"epss","scoring_elements":"0.93351","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10879","scoring_system":"epss","scoring_elements":"0.93418","published_at":"2026-05-05T12:55:00Z"},{"value":"0.10879","scoring_system":"epss","scoring_elements":"0.93413","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10879","scoring_system":"epss","scoring_elements":"0.93416","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10879","scoring_system":"epss","scoring_elements":"0.93412","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10879","scoring_system":"epss","scoring_elements":"0.93359","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10879","scoring_system":"epss","scoring_elements":"0.93367","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10879","scoring_system":"epss","scoring_elements":"0.93374","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10879","scoring_system":"epss","scoring_elements":"0.93378","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10879","scoring_system":"epss","scoring_elements":"0.93383","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10879","scoring_system":"epss","scoring_elements":"0.93382","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10879","scoring_system":"epss","scoring_elements":"0.93401","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10879","scoring_system":"epss","scoring_elements":"0.93406","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-3075"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3075","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3075"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=19879","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=19879"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=317b199b4aff8cfa27f2302ab404d2bb5032b9a4","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=317b199b4aff8cfa27f2302ab404d2bb5032b9a4"},{"reference_url":"http://www.securityfocus.com/bid/85732","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/85732"},{"reference_url":"http://www.ubuntu.com/usn/USN-2985-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2985-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1321866","reference_id":"1321866","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1321866"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3075","reference_id":"CVE-2016-3075","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-3075"},{"reference_url":"https://security.gentoo.org/glsa/201702-11","reference_id":"GLSA-201702-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201702-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2573","reference_id":"RHSA-2016:2573","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2573"},{"reference_url":"https://usn.ubuntu.com/2985-1/","reference_id":"USN-2985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2985-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923461?format=json","purl":"pkg:deb/debian/glibc@2.22-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.22-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2016-3075"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f7vd-cpza-xfcx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83797?format=json","vulnerability_id":"VCID-f9ts-xn57-6qa8","summary":"glibc: Memory leak reachable via LD_HWCAP_MASK","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000408.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000408.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000408","reference_id":"","reference_type":"","scores":[{"value":"0.00761","scoring_system":"epss","scoring_elements":"0.73295","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00764","scoring_system":"epss","scoring_elements":"0.73386","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00764","scoring_system":"epss","scoring_elements":"0.73409","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00764","scoring_system":"epss","scoring_elements":"0.73381","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00764","scoring_system":"epss","scoring_elements":"0.73418","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00764","scoring_system":"epss","scoring_elements":"0.73432","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00764","scoring_system":"epss","scoring_elements":"0.73455","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00764","scoring_system":"epss","scoring_elements":"0.73435","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00764","scoring_system":"epss","scoring_elements":"0.73427","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00764","scoring_system":"epss","scoring_elements":"0.7347","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00764","scoring_system":"epss","scoring_elements":"0.73478","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00764","scoring_system":"epss","scoring_elements":"0.73472","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00764","scoring_system":"epss","scoring_elements":"0.73505","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00764","scoring_system":"epss","scoring_elements":"0.73517","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00764","scoring_system":"epss","scoring_elements":"0.73514","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00764","scoring_system":"epss","scoring_elements":"0.73508","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000408"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000408","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000408"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1522828","reference_id":"1522828","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1522828"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884132","reference_id":"884132","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884132"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43331.txt","reference_id":"CVE-2017-1000409;CVE-2017-1000408","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43331.txt"},{"reference_url":"https://usn.ubuntu.com/3534-1/","reference_id":"USN-3534-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3534-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923466?format=json","purl":"pkg:deb/debian/glibc@2.25-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.25-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2017-1000408"],"risk_score":6.0,"exploitability":"2.0","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f9ts-xn57-6qa8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85784?format=json","vulnerability_id":"VCID-fjrd-sadn-kfcf","summary":"glibc: potential denial of service in internal_fnmatch()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8984.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8984.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8984","reference_id":"","reference_type":"","scores":[{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73338","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73344","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73203","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73213","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73234","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73207","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73244","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73257","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73281","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73261","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73254","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73297","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73305","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73298","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73332","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73345","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8984"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8984"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=18032","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=18032"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=4a28f4d55a6cc33474c0792fe93b5942d81bf185","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=4a28f4d55a6cc33474c0792fe93b5942d81bf185"},{"reference_url":"https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/02/26/5","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/02/26/5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2017/02/14/9","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2017/02/14/9"},{"reference_url":"http://www.securityfocus.com/bid/72789","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/72789"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1197730","reference_id":"1197730","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1197730"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779587","reference_id":"779587","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779587"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8984","reference_id":"CVE-2015-8984","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8984"},{"reference_url":"https://usn.ubuntu.com/3239-1/","reference_id":"USN-3239-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3239-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923442?format=json","purl":"pkg:deb/debian/glibc@2.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2015-8984"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fjrd-sadn-kfcf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57213?format=json","vulnerability_id":"VCID-gbqk-t5bg-dyby","summary":"Multiple vulnerabilities have been found in GNU C Library, the\n    worst of which allowing arbitrary code execution and privilege escalation.","references":[{"reference_url":"http://openwall.com/lists/oss-security/2011/03/04/10","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/04/10"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/04/11","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/04/11"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/04/12","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/04/12"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/04/9","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/04/9"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/05/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/05/3"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/05/7","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/05/7"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/07/9","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/07/9"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/14/16","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/14/16"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/14/5","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/14/5"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/14/7","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/14/7"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/15/6","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/15/6"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/22/4","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/22/4"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/22/6","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/22/6"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/31/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/31/3"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/31/4","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/31/4"},{"reference_url":"http://openwall.com/lists/oss-security/2011/04/01/2","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/04/01/2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1089.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1089.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1089","reference_id":"","reference_type":"","scores":[{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24749","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25091","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25172","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25213","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24984","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25052","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25097","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25112","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25071","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25017","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25026","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25018","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24989","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24926","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24915","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.2487","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1089"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1089","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1089"},{"reference_url":"http://sourceware.org/bugzilla/show_bug.cgi?id=12625","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/bugzilla/show_bug.cgi?id=12625"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:178","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:178"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:179","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:179"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-1526.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-1526.html"},{"reference_url":"http://www.securityfocus.com/bid/46740","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/46740"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=688980","reference_id":"688980","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=688980"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1089","reference_id":"CVE-2011-1089","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1089"},{"reference_url":"https://security.gentoo.org/glsa/201312-01","reference_id":"GLSA-201312-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1526","reference_id":"RHSA-2011:1526","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1526"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0125","reference_id":"RHSA-2012:0125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0126","reference_id":"RHSA-2012:0126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0126"},{"reference_url":"https://usn.ubuntu.com/1396-1/","reference_id":"USN-1396-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1396-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923433?format=json","purl":"pkg:deb/debian/glibc@2.13-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.13-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2011-1089"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gbqk-t5bg-dyby"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62166?format=json","vulnerability_id":"VCID-ge24-a7a4-d3bn","summary":"Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35942.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35942","reference_id":"","reference_type":"","scores":[{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78075","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78154","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78083","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78128","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78123","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78113","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78096","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01598","scoring_system":"epss","scoring_elements":"0.8178","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01598","scoring_system":"epss","scoring_elements":"0.81688","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01598","scoring_system":"epss","scoring_elements":"0.81682","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01598","scoring_system":"epss","scoring_elements":"0.8172","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01598","scoring_system":"epss","scoring_elements":"0.81723","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01598","scoring_system":"epss","scoring_elements":"0.81748","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01598","scoring_system":"epss","scoring_elements":"0.81757","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01598","scoring_system":"epss","scoring_elements":"0.81763","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-35942"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35942"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1977975","reference_id":"1977975","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1977975"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990542","reference_id":"990542","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=990542"},{"reference_url":"https://security.archlinux.org/AVG-1621","reference_id":"AVG-1621","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1621"},{"reference_url":"https://security.gentoo.org/glsa/202208-24","reference_id":"GLSA-202208-24","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/"}],"url":"https://security.gentoo.org/glsa/202208-24"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210827-0005/","reference_id":"ntap-20210827-0005","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210827-0005/"},{"reference_url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c","reference_id":"?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/"}],"url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4358","reference_id":"RHSA-2021:4358","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4358"},{"reference_url":"https://sourceware.org/glibc/wiki/Security%20Exceptions","reference_id":"Security%20Exceptions","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/"}],"url":"https://sourceware.org/glibc/wiki/Security%20Exceptions"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=28011","reference_id":"show_bug.cgi?id=28011","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:00:35Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=28011"},{"reference_url":"https://usn.ubuntu.com/5310-1/","reference_id":"USN-5310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-1/"},{"reference_url":"https://usn.ubuntu.com/5699-1/","reference_id":"USN-5699-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5699-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923486?format=json","purl":"pkg:deb/debian/glibc@2.31-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2021-35942"],"risk_score":4.1,"exploitability":"0.5","weighted_severity":"8.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ge24-a7a4-d3bn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34316?format=json","vulnerability_id":"VCID-gv4u-g36a-w3cf","summary":"Multiple vulnerabilities in glibc could result in Local Privilege Escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4911.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4911.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4911","reference_id":"","reference_type":"","scores":[{"value":"0.59128","scoring_system":"epss","scoring_elements":"0.98223","published_at":"2026-04-04T12:55:00Z"},{"value":"0.59128","scoring_system":"epss","scoring_elements":"0.9822","published_at":"2026-04-02T12:55:00Z"},{"value":"0.62331","scoring_system":"epss","scoring_elements":"0.98371","published_at":"2026-04-26T12:55:00Z"},{"value":"0.67392","scoring_system":"epss","scoring_elements":"0.98577","published_at":"2026-04-24T12:55:00Z"},{"value":"0.67392","scoring_system":"epss","scoring_elements":"0.98574","published_at":"2026-04-21T12:55:00Z"},{"value":"0.67477","scoring_system":"epss","scoring_elements":"0.98584","published_at":"2026-04-29T12:55:00Z"},{"value":"0.72535","scoring_system":"epss","scoring_elements":"0.98763","published_at":"2026-04-07T12:55:00Z"},{"value":"0.72771","scoring_system":"epss","scoring_elements":"0.98771","published_at":"2026-04-08T12:55:00Z"},{"value":"0.74256","scoring_system":"epss","scoring_elements":"0.98858","published_at":"2026-05-05T12:55:00Z"},{"value":"0.74256","scoring_system":"epss","scoring_elements":"0.98837","published_at":"2026-04-09T12:55:00Z"},{"value":"0.74256","scoring_system":"epss","scoring_elements":"0.98839","published_at":"2026-04-12T12:55:00Z"},{"value":"0.74256","scoring_system":"epss","scoring_elements":"0.9884","published_at":"2026-04-13T12:55:00Z"},{"value":"0.74256","scoring_system":"epss","scoring_elements":"0.98844","published_at":"2026-04-16T12:55:00Z"},{"value":"0.74256","scoring_system":"epss","scoring_elements":"0.98845","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4911"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4911"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238352","reference_id":"2238352","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238352"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb","reference_id":"cpe:/a:redhat:rhel_eus:8.6::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb","reference_id":"cpe:/a:redhat:rhel_eus:9.0::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.0::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:9::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos","reference_id":"cpe:/o:redhat:rhel_eus:8.6::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos","reference_id":"cpe:/o:redhat:rhel_eus:9.0::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.0::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8","reference_id":"cpe:/o:redhat:rhev_hypervisor:4.4::el8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhev_hypervisor:4.4::el8"},{"reference_url":"https://www.qualys.com/cve-2023-4911/","reference_id":"cve-2023-4911","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"}],"url":"https://www.qualys.com/cve-2023-4911/"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-4911","reference_id":"CVE-2023-4911","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-4911"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/52479.txt","reference_id":"CVE-2023-4911","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/52479.txt"},{"reference_url":"https://security.gentoo.org/glsa/202310-03","reference_id":"GLSA-202310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202310-03"},{"reference_url":"https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt","reference_id":"looney-tunables-local-privilege-escalation-glibc-ld-so.txt","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"}],"url":"https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5453","reference_id":"RHSA-2023:5453","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:5453"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5454","reference_id":"RHSA-2023:5454","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:5454"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5455","reference_id":"RHSA-2023:5455","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:5455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5476","reference_id":"RHSA-2023:5476","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:5476"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0033","reference_id":"RHSA-2024:0033","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-15T19:45:35Z/"}],"url":"https://access.redhat.com/errata/RHSA-2024:0033"},{"reference_url":"https://usn.ubuntu.com/6409-1/","reference_id":"USN-6409-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6409-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923495?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923491?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923496?format=json","purl":"pkg:deb/debian/glibc@2.37-12?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.37-12%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2023-4911"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gv4u-g36a-w3cf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31488?format=json","vulnerability_id":"VCID-hdz6-ewkg-xqc9","summary":"Multiple vulnerabilities have been found in glibc, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15804.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15804.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15804","reference_id":"","reference_type":"","scores":[{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43014","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.4278","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43061","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.42996","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.42998","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.42916","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43072","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.431","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43039","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43092","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43104","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43126","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43077","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43137","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00207","scoring_system":"epss","scoring_elements":"0.43127","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"},{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22332","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22332"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=a159b53fa059947cc2548e3b0d5bdcf7b9630ba8","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=a159b53fa059947cc2548e3b0d5bdcf7b9630ba8"},{"reference_url":"http://www.securityfocus.com/bid/101535","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101535"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1505298","reference_id":"1505298","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1505298"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879955","reference_id":"879955","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879955"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15804","reference_id":"CVE-2017-15804","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15804"},{"reference_url":"https://security.gentoo.org/glsa/201804-02","reference_id":"GLSA-201804-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0805","reference_id":"RHSA-2018:0805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0805"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1879","reference_id":"RHSA-2018:1879","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1879"},{"reference_url":"https://usn.ubuntu.com/3534-1/","reference_id":"USN-3534-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3534-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923469?format=json","purl":"pkg:deb/debian/glibc@2.25-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.25-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2017-15804"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hdz6-ewkg-xqc9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89895?format=json","vulnerability_id":"VCID-hh17-b5wu-myav","summary":"security flaw","references":[{"reference_url":"http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000507","reference_id":"","reference_type":"","scores":[],"url":"http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000507"},{"reference_url":"http://marc.info/?l=bugtraq&m=102581482511612&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=102581482511612&w=2"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2002-139.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2002-139.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0684.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0684.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2002-0684","reference_id":"","reference_type":"","scores":[{"value":"0.03647","scoring_system":"epss","scoring_elements":"0.87903","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03647","scoring_system":"epss","scoring_elements":"0.87805","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03647","scoring_system":"epss","scoring_elements":"0.87816","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03647","scoring_system":"epss","scoring_elements":"0.87827","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03647","scoring_system":"epss","scoring_elements":"0.87831","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03647","scoring_system":"epss","scoring_elements":"0.87852","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03647","scoring_system":"epss","scoring_elements":"0.87859","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03647","scoring_system":"epss","scoring_elements":"0.8787","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03647","scoring_system":"epss","scoring_elements":"0.87863","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03647","scoring_system":"epss","scoring_elements":"0.87862","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03647","scoring_system":"epss","scoring_elements":"0.87876","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03647","scoring_system":"epss","scoring_elements":"0.87874","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03647","scoring_system":"epss","scoring_elements":"0.87872","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03647","scoring_system":"epss","scoring_elements":"0.87888","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03647","scoring_system":"epss","scoring_elements":"0.87894","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03647","scoring_system":"epss","scoring_elements":"0.87892","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2002-0684"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0684","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0684"},{"reference_url":"http://www.kb.cert.org/vuls/id/542971","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/542971"},{"reference_url":"http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-050.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-050.php"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616795","reference_id":"1616795","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616795"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:4.9.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:4.9.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:4.9.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2002-0684","reference_id":"CVE-2002-0684","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2002-0684"},{"reference_url":"https://access.redhat.com/errata/RHSA-2002:139","reference_id":"RHSA-2002:139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2002:139"},{"reference_url":"https://access.redhat.com/errata/RHSA-2002:167","reference_id":"RHSA-2002:167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2002:167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:212","reference_id":"RHSA-2003:212","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:212"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923412?format=json","purl":"pkg:deb/debian/glibc@2.2.5-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.2.5-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2002-0684"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hh17-b5wu-myav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59735?format=json","vulnerability_id":"VCID-hj77-4nfx-fuaa","summary":"Multiple vulnerabilities have been found in glibc, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29562.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29562.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29562","reference_id":"","reference_type":"","scores":[{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16125","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.15916","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16169","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16255","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16319","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16301","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16261","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16193","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16131","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16149","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16186","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16076","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16074","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16035","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16308","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.1637","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29562"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29562"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1905217","reference_id":"1905217","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1905217"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976391","reference_id":"976391","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=976391"},{"reference_url":"https://security.archlinux.org/ASA-202102-16","reference_id":"ASA-202102-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202102-16"},{"reference_url":"https://security.archlinux.org/ASA-202102-17","reference_id":"ASA-202102-17","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202102-17"},{"reference_url":"https://security.archlinux.org/AVG-1320","reference_id":"AVG-1320","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1320"},{"reference_url":"https://security.gentoo.org/glsa/202101-20","reference_id":"GLSA-202101-20","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:13:36Z/"}],"url":"https://security.gentoo.org/glsa/202101-20"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210122-0004/","reference_id":"ntap-20210122-0004","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:13:36Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210122-0004/"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=26923","reference_id":"show_bug.cgi?id=26923","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:13:36Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=26923"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/","reference_id":"TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:13:36Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/"},{"reference_url":"https://usn.ubuntu.com/5310-1/","reference_id":"USN-5310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923481?format=json","purl":"pkg:deb/debian/glibc@2.31-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2020-29562"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hj77-4nfx-fuaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54359?format=json","vulnerability_id":"VCID-hkyd-8rrg-v3e7","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3406.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3406.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3406","reference_id":"","reference_type":"","scores":[{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75132","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75135","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75165","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75142","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75176","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75188","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75209","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75187","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75213","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75219","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75208","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75246","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.7525","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75254","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00869","scoring_system":"epss","scoring_elements":"0.75263","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7424"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1473"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681888","reference_id":"681888","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681888"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=826943","reference_id":"826943","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=826943"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1097","reference_id":"RHSA-2012:1097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1098","reference_id":"RHSA-2012:1098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1200","reference_id":"RHSA-2012:1200","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1200"},{"reference_url":"https://usn.ubuntu.com/1589-1/","reference_id":"USN-1589-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1589-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923437?format=json","purl":"pkg:deb/debian/glibc@2.19-14?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2012-3406"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hkyd-8rrg-v3e7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59736?format=json","vulnerability_id":"VCID-hrky-wxm3-5fh3","summary":"Multiple vulnerabilities have been found in glibc, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29573.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29573.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29573","reference_id":"","reference_type":"","scores":[{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36892","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.3644","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36645","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36557","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.37061","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.37094","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36922","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36973","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36986","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36995","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.3696","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36934","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36979","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36963","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36902","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36677","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-29573"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29573","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29573"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1905213","reference_id":"1905213","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1905213"},{"reference_url":"https://security.archlinux.org/AVG-1324","reference_id":"AVG-1324","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1324"},{"reference_url":"https://security.gentoo.org/glsa/202101-20","reference_id":"GLSA-202101-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202101-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0348","reference_id":"RHSA-2021:0348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0949","reference_id":"RHSA-2021:0949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0949"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2813","reference_id":"RHSA-2021:2813","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2813"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2998","reference_id":"RHSA-2021:2998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3315","reference_id":"RHSA-2021:3315","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3315"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923451?format=json","purl":"pkg:deb/debian/glibc@2.23-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.23-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2020-29573"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hrky-wxm3-5fh3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57212?format=json","vulnerability_id":"VCID-hu2t-wcga-c3e9","summary":"Multiple vulnerabilities have been found in GNU C Library, the\n    worst of which allowing arbitrary code execution and privilege escalation.","references":[{"reference_url":"http://bugs.debian.org/615120","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/615120"},{"reference_url":"http://code.google.com/p/chromium/issues/detail?id=48733","reference_id":"","reference_type":"","scores":[],"url":"http://code.google.com/p/chromium/issues/detail?id=48733"},{"reference_url":"http://openwall.com/lists/oss-security/2011/02/26/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/02/26/3"},{"reference_url":"http://openwall.com/lists/oss-security/2011/02/28/11","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/02/28/11"},{"reference_url":"http://openwall.com/lists/oss-security/2011/02/28/15","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/02/28/15"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1071.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1071.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1071","reference_id":"","reference_type":"","scores":[{"value":"0.05233","scoring_system":"epss","scoring_elements":"0.90004","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05233","scoring_system":"epss","scoring_elements":"0.89921","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05233","scoring_system":"epss","scoring_elements":"0.89924","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05233","scoring_system":"epss","scoring_elements":"0.89937","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05233","scoring_system":"epss","scoring_elements":"0.89943","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05233","scoring_system":"epss","scoring_elements":"0.89959","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05233","scoring_system":"epss","scoring_elements":"0.89965","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05233","scoring_system":"epss","scoring_elements":"0.89973","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05233","scoring_system":"epss","scoring_elements":"0.89971","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05233","scoring_system":"epss","scoring_elements":"0.89964","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05233","scoring_system":"epss","scoring_elements":"0.89979","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05233","scoring_system":"epss","scoring_elements":"0.89976","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05233","scoring_system":"epss","scoring_elements":"0.89992","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05233","scoring_system":"epss","scoring_elements":"0.89991","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05233","scoring_system":"epss","scoring_elements":"0.8999","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1071"},{"reference_url":"http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html","reference_id":"","reference_type":"","scores":[],"url":"http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1071","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1071"},{"reference_url":"http://seclists.org/fulldisclosure/2011/Feb/635","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2011/Feb/635"},{"reference_url":"http://seclists.org/fulldisclosure/2011/Feb/644","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2011/Feb/644"},{"reference_url":"http://secunia.com/advisories/43492","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43492"},{"reference_url":"http://secunia.com/advisories/43830","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43830"},{"reference_url":"http://secunia.com/advisories/43989","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43989"},{"reference_url":"http://secunia.com/advisories/46397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/46397"},{"reference_url":"http://securityreason.com/securityalert/8175","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/securityalert/8175"},{"reference_url":"http://securitytracker.com/id?1025290","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1025290"},{"reference_url":"http://sourceware.org/bugzilla/show_bug.cgi?id=11883","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/bugzilla/show_bug.cgi?id=11883"},{"reference_url":"http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=f15ce4d8dc139523fe0c273580b604b2453acba6","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=f15ce4d8dc139523fe0c273580b604b2453acba6"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12853","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12853"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:178","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:178"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0412.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0412.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0413.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0413.html"},{"reference_url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/46563","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/46563"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0863","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0863"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=681054","reference_id":"681054","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=681054"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:eglibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:eglibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:eglibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/17120.c","reference_id":"CVE-2011-1071","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/17120.c"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1071","reference_id":"CVE-2011-1071","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1071"},{"reference_url":"https://www.securityfocus.com/bid/46563/info","reference_id":"CVE-2011-1071","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/46563/info"},{"reference_url":"https://security.gentoo.org/glsa/201312-01","reference_id":"GLSA-201312-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0412","reference_id":"RHSA-2011:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0413","reference_id":"RHSA-2011:0413","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0413"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0125","reference_id":"RHSA-2012:0125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0125"},{"reference_url":"https://usn.ubuntu.com/1396-1/","reference_id":"USN-1396-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1396-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923432?format=json","purl":"pkg:deb/debian/glibc@2.11.2-12?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.11.2-12%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2011-1071"],"risk_score":9.2,"exploitability":"2.0","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hu2t-wcga-c3e9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84601?format=json","vulnerability_id":"VCID-jadt-55f6-uuh6","summary":"glibc: Use-after-free read access in clntudp_call in sunrpc","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12133.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12133.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12133","reference_id":"","reference_type":"","scores":[{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64663","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64784","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64794","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64807","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64803","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64715","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64744","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64702","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64749","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64764","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64781","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64769","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64742","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64779","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.6479","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64777","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12133"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1478288","reference_id":"1478288","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1478288"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870648","reference_id":"870648","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870648"},{"reference_url":"https://security.archlinux.org/AVG-368","reference_id":"AVG-368","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-368"},{"reference_url":"https://security.archlinux.org/AVG-369","reference_id":"AVG-369","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-369"},{"reference_url":"https://usn.ubuntu.com/4416-1/","reference_id":"USN-4416-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4416-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923468?format=json","purl":"pkg:deb/debian/glibc@2.24-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.24-15%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2017-12133"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jadt-55f6-uuh6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49149?format=json","vulnerability_id":"VCID-jkcw-geyg-t3e5","summary":"Multiple vulnerabilities in glibc could result in Local Privilege Escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6780.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6780.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6780","reference_id":"","reference_type":"","scores":[{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43777","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.44092","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.4406","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.44044","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.44105","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.44096","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.4403","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43981","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43984","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43899","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46231","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.4625","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46198","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46254","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00234","scoring_system":"epss","scoring_elements":"0.46256","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6780"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254396","reference_id":"2254396","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-31T16:36:34Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254396"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Feb/3","reference_id":"3","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-31T16:36:34Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Feb/3"},{"reference_url":"https://www.openwall.com/lists/oss-security/2024/01/30/6","reference_id":"6","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-31T16:36:34Z/"}],"url":"https://www.openwall.com/lists/oss-security/2024/01/30/6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-6780","reference_id":"CVE-2023-6780","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-31T16:36:34Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-6780"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/","reference_id":"D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-31T16:36:34Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/"},{"reference_url":"http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html","reference_id":"glibc-syslog-Heap-Based-Buffer-Overflow.html","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-31T16:36:34Z/"}],"url":"http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html"},{"reference_url":"https://security.gentoo.org/glsa/202402-01","reference_id":"GLSA-202402-01","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-31T16:36:34Z/"}],"url":"https://security.gentoo.org/glsa/202402-01"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/","reference_id":"MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-31T16:36:34Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/"},{"reference_url":"https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt","reference_id":"syslog.txt","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-31T16:36:34Z/"}],"url":"https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt"},{"reference_url":"https://usn.ubuntu.com/6620-1/","reference_id":"USN-6620-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6620-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923418?format=json","purl":"pkg:deb/debian/glibc@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923498?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923499?format=json","purl":"pkg:deb/debian/glibc@2.37-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.37-15%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2023-6780"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jkcw-geyg-t3e5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85196?format=json","vulnerability_id":"VCID-jnz7-w98a-kqgs","summary":"glibc: getaddrinfo should reject IP addresses with trailing characters","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00082.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10739.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10739.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10739","reference_id":"","reference_type":"","scores":[{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06264","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06297","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06331","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06307","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06354","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06394","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00024","scoring_system":"epss","scoring_elements":"0.06387","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12297","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12247","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12138","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12059","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.1233","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12292","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12189","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12192","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12279","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10739"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=20018","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=20018"},{"reference_url":"http://www.securityfocus.com/bid/106672","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/106672"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1347549","reference_id":"1347549","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1347549"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920047","reference_id":"920047","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=920047"},{"reference_url":"https://security.archlinux.org/AVG-1984","reference_id":"AVG-1984","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1984"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-10739","reference_id":"CVE-2016-10739","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-10739"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2118","reference_id":"RHSA-2019:2118","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2118"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:3513","reference_id":"RHSA-2019:3513","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:3513"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923459?format=json","purl":"pkg:deb/debian/glibc@2.28-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2016-10739"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jnz7-w98a-kqgs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79622?format=json","vulnerability_id":"VCID-jswq-6ru6-wybc","summary":"glibc: potential use-after-free in gaih_inet()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4813.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4813.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4813","reference_id":"","reference_type":"","scores":[{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53607","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53635","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53604","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53655","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53653","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53702","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53685","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53668","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53706","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53711","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53693","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53633","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00304","scoring_system":"epss","scoring_elements":"0.53585","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4813"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2237798","reference_id":"2237798","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2237798"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5453","reference_id":"RHSA-2023:5453","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5453"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5455","reference_id":"RHSA-2023:5455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:5455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7409","reference_id":"RHSA-2023:7409","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7409"},{"reference_url":"https://usn.ubuntu.com/6541-1/","reference_id":"USN-6541-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6541-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923494?format=json","purl":"pkg:deb/debian/glibc@2.36-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2023-4813"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jswq-6ru6-wybc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34313?format=json","vulnerability_id":"VCID-k8c9-hx6q-mbfq","summary":"Multiple vulnerabilities in glibc could result in Local Privilege Escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39046.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-39046.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39046","reference_id":"","reference_type":"","scores":[{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71628","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71646","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71619","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71659","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.7167","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71694","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71677","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71658","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71702","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71708","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.7169","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71739","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71744","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.7175","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00685","scoring_system":"epss","scoring_elements":"0.71734","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-39046"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2123394","reference_id":"2123394","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2123394"},{"reference_url":"https://security.gentoo.org/glsa/202310-03","reference_id":"GLSA-202310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202310-03"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923418?format=json","purl":"pkg:deb/debian/glibc@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2022-39046"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k8c9-hx6q-mbfq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/128671?format=json","vulnerability_id":"VCID-kb2y-nbd3-mudm","summary":"Integer overflow in the fts_build function in fts.c in libc in (1) OpenBSD 4.4 and earlier and (2) Microsoft Interix 6.0 build 10.0.6030.0 allows context-dependent attackers to cause a denial of service (application crash) via a deep directory tree, related to the fts_level structure member, as demonstrated by (a) du, (b) rm, (c) chmod, and (d) chgrp on OpenBSD; and (e) SearchIndexer.exe on Vista Enterprise.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0537","reference_id":"","reference_type":"","scores":[{"value":"0.07054","scoring_system":"epss","scoring_elements":"0.91456","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07054","scoring_system":"epss","scoring_elements":"0.9152","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07054","scoring_system":"epss","scoring_elements":"0.91528","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07054","scoring_system":"epss","scoring_elements":"0.91526","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07054","scoring_system":"epss","scoring_elements":"0.91462","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07054","scoring_system":"epss","scoring_elements":"0.91469","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07054","scoring_system":"epss","scoring_elements":"0.91477","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07054","scoring_system":"epss","scoring_elements":"0.9149","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07054","scoring_system":"epss","scoring_elements":"0.91496","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07054","scoring_system":"epss","scoring_elements":"0.91501","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07054","scoring_system":"epss","scoring_elements":"0.91503","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07054","scoring_system":"epss","scoring_elements":"0.91524","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07054","scoring_system":"epss","scoring_elements":"0.91519","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0795","scoring_system":"epss","scoring_elements":"0.92072","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0795","scoring_system":"epss","scoring_elements":"0.92083","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-0537"},{"reference_url":"http://securityreason.com/achievement_securityalert/60","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/achievement_securityalert/60"},{"reference_url":"https://www.exploit-db.com/exploits/8163","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/8163"},{"reference_url":"http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gen/fts.c","reference_id":"","reference_type":"","scores":[],"url":"http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gen/fts.c"},{"reference_url":"http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gen/fts.c.diff?r1=1.41%3Br2=1.42%3Bf=h","reference_id":"","reference_type":"","scores":[],"url":"http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gen/fts.c.diff?r1=1.41%3Br2=1.42%3Bf=h"},{"reference_url":"http://www.securityfocus.com/archive/1/501505/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/501505/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/34008","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/34008"},{"reference_url":"http://www.securitytracker.com/id?1021818","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021818"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:interix:6.0:*:10.0.6030.0:*:*:*:*:*","reference_id":"cpe:2.3:a:microsoft:interix:6.0:*:10.0.6030.0:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:interix:6.0:*:10.0.6030.0:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:3.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:3.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0537","reference_id":"CVE-2009-0537","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-0537"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/8163.txt","reference_id":"OSVDB-52463;CVE-2009-0537","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/bsd/dos/8163.txt"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923418?format=json","purl":"pkg:deb/debian/glibc@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2009-0537"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kb2y-nbd3-mudm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61770?format=json","vulnerability_id":"VCID-kpcn-f4dw-97hm","summary":"Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2207.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2207.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2207","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21392","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21651","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21822","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21874","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21627","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21703","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2176","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21771","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21732","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21675","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21683","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21653","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21505","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21499","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21486","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-2207"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2207","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2207"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717544","reference_id":"717544","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717544"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=976408","reference_id":"976408","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=976408"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://usn.ubuntu.com/2985-1/","reference_id":"USN-2985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2985-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923442?format=json","purl":"pkg:deb/debian/glibc@2.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2013-2207"],"risk_score":1.0,"exploitability":"0.5","weighted_severity":"2.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kpcn-f4dw-97hm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90243?format=json","vulnerability_id":"VCID-kqud-8xme-x7dq","summary":"glibc: manual/search.texi lacks a statement about the unspecified tdelete return value upon deletion of a tree's root","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-1999-0199.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-1999-0199.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-1999-0199","reference_id":"","reference_type":"","scores":[{"value":"0.00793","scoring_system":"epss","scoring_elements":"0.73867","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00793","scoring_system":"epss","scoring_elements":"0.73877","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00793","scoring_system":"epss","scoring_elements":"0.73902","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00793","scoring_system":"epss","scoring_elements":"0.73874","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00793","scoring_system":"epss","scoring_elements":"0.73908","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00793","scoring_system":"epss","scoring_elements":"0.73922","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00793","scoring_system":"epss","scoring_elements":"0.73944","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00793","scoring_system":"epss","scoring_elements":"0.73925","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00793","scoring_system":"epss","scoring_elements":"0.73917","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00793","scoring_system":"epss","scoring_elements":"0.73959","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00793","scoring_system":"epss","scoring_elements":"0.73968","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00793","scoring_system":"epss","scoring_elements":"0.73993","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00793","scoring_system":"epss","scoring_elements":"0.74002","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00793","scoring_system":"epss","scoring_elements":"0.74","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00793","scoring_system":"epss","scoring_elements":"0.73995","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-1999-0199"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0199","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0199"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1885775","reference_id":"1885775","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1885775"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923406?format=json","purl":"pkg:deb/debian/glibc@2.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-1999-0199"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kqud-8xme-x7dq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43045?format=json","vulnerability_id":"VCID-kukb-s61t-pbc3","summary":"Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8058.json","reference_id":"","reference_type":"","scores":[{"value":"4.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-8058.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-8058","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01206","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01131","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.012","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01205","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01212","published_at":"2026-04-26T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00675","published_at":"2026-04-02T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00668","published_at":"2026-04-04T12:55:00Z"},{"value":"8e-05","scoring_system":"epss","scoring_elements":"0.00671","published_at":"2026-04-07T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00936","published_at":"2026-04-08T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00933","published_at":"2026-04-09T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00921","published_at":"2026-04-11T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00916","published_at":"2026-04-12T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00917","published_at":"2026-04-13T12:55:00Z"},{"value":"9e-05","scoring_system":"epss","scoring_elements":"0.00914","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-8058"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8058","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8058"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109803","reference_id":"1109803","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109803"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2383146","reference_id":"2383146","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2383146"},{"reference_url":"https://security.gentoo.org/glsa/202509-04","reference_id":"GLSA-202509-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202509-04"},{"reference_url":"https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f","reference_id":"?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:H/SC:L/SI:L/SA:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-23T20:07:48Z/"}],"url":"https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12748","reference_id":"RHSA-2025:12748","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12748"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:12980","reference_id":"RHSA-2025:12980","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:12980"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13240","reference_id":"RHSA-2025:13240","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13240"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13335","reference_id":"RHSA-2025:13335","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13335"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13622","reference_id":"RHSA-2025:13622","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13622"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14186","reference_id":"RHSA-2025:14186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22529","reference_id":"RHSA-2025:22529","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22529"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33185","reference_id":"show_bug.cgi?id=33185","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:H/SC:L/SI:L/SA:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-23T20:07:48Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33185"},{"reference_url":"https://usn.ubuntu.com/7760-1/","reference_id":"USN-7760-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7760-1/"},{"reference_url":"https://usn.ubuntu.com/8005-1/","reference_id":"USN-8005-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/8005-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923514?format=json","purl":"pkg:deb/debian/glibc@2.41-11?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2025-8058"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kukb-s61t-pbc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54413?format=json","vulnerability_id":"VCID-kwbk-pngd-3bh9","summary":"security update","references":[{"reference_url":"http://linux.oracle.com/errata/ELSA-2015-0016.html","reference_id":"","reference_type":"","scores":[],"url":"http://linux.oracle.com/errata/ELSA-2015-0016.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6040.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6040.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6040","reference_id":"","reference_type":"","scores":[{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.91622","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.91544","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.91551","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.91558","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.91566","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.91579","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.91585","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.91589","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.91591","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.91612","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.91606","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.91614","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07187","scoring_system":"epss","scoring_elements":"0.9161","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-6040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235"},{"reference_url":"http://secunia.com/advisories/62100","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62100"},{"reference_url":"http://secunia.com/advisories/62146","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62146"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=17325","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=17325"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=41488498b6","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=41488498b6"},{"reference_url":"http://ubuntu.com/usn/usn-2432-1","reference_id":"","reference_type":"","scores":[],"url":"http://ubuntu.com/usn/usn-2432-1"},{"reference_url":"http://www.debian.org/security/2015/dsa-3142","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3142"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:175","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:175"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/08/29/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/08/29/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/09/02/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/09/02/1"},{"reference_url":"http://www.securityfocus.com/bid/69472","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/69472"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1135841","reference_id":"1135841","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1135841"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-6040","reference_id":"CVE-2014-6040","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-6040"},{"reference_url":"https://security.gentoo.org/glsa/201602-02","reference_id":"GLSA-201602-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0016","reference_id":"RHSA-2015:0016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0327","reference_id":"RHSA-2015:0327","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0327"},{"reference_url":"https://usn.ubuntu.com/2432-1/","reference_id":"USN-2432-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2432-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923450?format=json","purl":"pkg:deb/debian/glibc@2.19-12?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-12%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2014-6040"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kwbk-pngd-3bh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83763?format=json","vulnerability_id":"VCID-kxg9-kntn-xqan","summary":"glibc: memory corruption in memcpy-sse2-unaligned.S","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18269.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18269.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-18269","reference_id":"","reference_type":"","scores":[{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78068","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78218","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78185","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.7819","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78205","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78077","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78107","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78089","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78115","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.7812","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78146","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78128","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78124","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78158","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78157","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01109","scoring_system":"epss","scoring_elements":"0.78152","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-18269"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18269","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18269"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/fingolfin/memmove-bug","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/fingolfin/memmove-bug"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190329-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190329-0001/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190401-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190401-0001/"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22644","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22644"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=cd66c0e584c6d692bc8347b5e72723d02b8a8ada","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=cd66c0e584c6d692bc8347b5e72723d02b8a8ada"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1580924","reference_id":"1580924","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1580924"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18269","reference_id":"CVE-2017-18269","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-18269"},{"reference_url":"https://usn.ubuntu.com/4416-1/","reference_id":"USN-4416-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4416-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923471?format=json","purl":"pkg:deb/debian/glibc@2.27-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.27-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2017-18269"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kxg9-kntn-xqan"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90616?format=json","vulnerability_id":"VCID-mneq-btk4-5be2","summary":"Integer signedness error in Glibc before 2.13 and eglibc before 2.13, when using Supplemental Streaming SIMD Extensions 3 (SSSE3) optimization, allows context-dependent attackers to execute arbitrary code via a negative length parameter to (1) memcpy-ssse3-rep.S, (2) memcpy-ssse3.S, or (3) memset-sse2.S in sysdeps/i386/i686/multiarch/, which triggers an out-of-bounds read, as demonstrated using the memcpy function.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2702.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2702.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2702","reference_id":"","reference_type":"","scores":[{"value":"0.03354","scoring_system":"epss","scoring_elements":"0.87383","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03354","scoring_system":"epss","scoring_elements":"0.87342","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03354","scoring_system":"epss","scoring_elements":"0.87359","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03354","scoring_system":"epss","scoring_elements":"0.87365","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03354","scoring_system":"epss","scoring_elements":"0.87367","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03354","scoring_system":"epss","scoring_elements":"0.87301","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03354","scoring_system":"epss","scoring_elements":"0.8732","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03354","scoring_system":"epss","scoring_elements":"0.87327","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03354","scoring_system":"epss","scoring_elements":"0.87339","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03354","scoring_system":"epss","scoring_elements":"0.87333","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03354","scoring_system":"epss","scoring_elements":"0.87329","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03354","scoring_system":"epss","scoring_elements":"0.87344","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03354","scoring_system":"epss","scoring_elements":"0.87347","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04486","scoring_system":"epss","scoring_elements":"0.89068","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04486","scoring_system":"epss","scoring_elements":"0.89083","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04486","scoring_system":"epss","scoring_elements":"0.89059","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-2702"},{"reference_url":"https://bugzilla.novell.com/show_bug.cgi?id=706915","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.novell.com/show_bug.cgi?id=706915"},{"reference_url":"http://seclists.org/oss-sec/2011/q3/123","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/oss-sec/2011/q3/123"},{"reference_url":"http://seclists.org/oss-sec/2011/q3/153","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/oss-sec/2011/q3/153"},{"reference_url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=a0ac24d98ace90d1ccba6a2f3e7d55600f2fdb6e","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=a0ac24d98ace90d1ccba6a2f3e7d55600f2fdb6e"},{"reference_url":"http://www.eglibc.org/cgi-bin/viewvc.cgi/trunk/libc/ChangeLog?view=markup&pathrev=10032","reference_id":"","reference_type":"","scores":[],"url":"http://www.eglibc.org/cgi-bin/viewvc.cgi/trunk/libc/ChangeLog?view=markup&pathrev=10032"},{"reference_url":"http://www.nodefense.org/eglibc.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.nodefense.org/eglibc.txt"},{"reference_url":"http://www.osvdb.org/80718","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/80718"},{"reference_url":"http://xorl.wordpress.com/2011/08/06/cve-2011-2702-eglibc-and-glibc-signedness-issue/","reference_id":"","reference_type":"","scores":[],"url":"http://xorl.wordpress.com/2011/08/06/cve-2011-2702-eglibc-and-glibc-signedness-issue/"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:eglibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:eglibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:eglibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-2702","reference_id":"CVE-2011-2702","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-2702"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/20167.txt","reference_id":"CVE-2011-2702;OSVDB-80718","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/20167.txt"},{"reference_url":"https://usn.ubuntu.com/1396-1/","reference_id":"USN-1396-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1396-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923418?format=json","purl":"pkg:deb/debian/glibc@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2011-2702"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mneq-btk4-5be2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61416?format=json","vulnerability_id":"VCID-mqch-gxfq-zyhh","summary":"Multiple vulnerabilities have been found in glibc, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10029.json","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10029.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10029","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12802","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.129","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1295","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12753","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12833","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12884","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1285","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12812","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12767","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1267","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12677","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15455","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15601","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15644","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15642","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15584","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-10029"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1810670","reference_id":"1810670","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1810670"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953108","reference_id":"953108","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953108"},{"reference_url":"https://security.gentoo.org/glsa/202006-04","reference_id":"GLSA-202006-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202006-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4444","reference_id":"RHSA-2020:4444","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4444"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0348","reference_id":"RHSA-2021:0348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0949","reference_id":"RHSA-2021:0949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0949"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2998","reference_id":"RHSA-2021:2998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:3315","reference_id":"RHSA-2021:3315","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:3315"},{"reference_url":"https://usn.ubuntu.com/4416-1/","reference_id":"USN-4416-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4416-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923478?format=json","purl":"pkg:deb/debian/glibc@2.30-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.30-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2020-10029"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mqch-gxfq-zyhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89879?format=json","vulnerability_id":"VCID-mrha-gp2j-vkf7","summary":"security flaw","references":[{"reference_url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-055.0.txt","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-055.0.txt"},{"reference_url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-011.txt.asc","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-011.txt.asc"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20020801-01-A","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"ftp://patches.sgi.com/support/free/security/advisories/20020801-01-A"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20020801-01-P","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"ftp://patches.sgi.com/support/free/security/advisories/20020801-01-P"},{"reference_url":"http://archives.neohapsis.com/archives/aix/2002-q4/0002.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://archives.neohapsis.com/archives/aix/2002-q4/0002.html"},{"reference_url":"http://archives.neohapsis.com/archives/bugtraq/2002-07/0514.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://archives.neohapsis.com/archives/bugtraq/2002-07/0514.html"},{"reference_url":"http://archives.neohapsis.com/archives/hp/2002-q3/0077.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://archives.neohapsis.com/archives/hp/2002-q3/0077.html"},{"reference_url":"http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20823","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20823"},{"reference_url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000515","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000515"},{"reference_url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000535","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000535"},{"reference_url":"http://marc.info/?l=bugtraq&m=102813809232532&w=2","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://marc.info/?l=bugtraq&m=102813809232532&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=102821785316087&w=2","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://marc.info/?l=bugtraq&m=102821785316087&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=102821928418261&w=2","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://marc.info/?l=bugtraq&m=102821928418261&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=102831443208382&w=2","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://marc.info/?l=bugtraq&m=102831443208382&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=103158632831416&w=2","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://marc.info/?l=bugtraq&m=103158632831416&w=2"},{"reference_url":"http://online.securityfocus.com/advisories/4402","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://online.securityfocus.com/advisories/4402"},{"reference_url":"http://online.securityfocus.com/archive/1/285740","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://online.securityfocus.com/archive/1/285740"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2002-166.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2002-166.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2002-172.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2002-172.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0391.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0391.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2002-0391","reference_id":"","reference_type":"","scores":[{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92249","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92235","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92244","published_at":"2026-04-16T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92243","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92234","published_at":"2026-04-11T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92229","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92225","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92214","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92245","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92232","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.9225","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92246","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92211","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92205","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92198","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92257","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2002-0391"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0391","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0391"},{"reference_url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-057","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-057"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A42","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A42"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4728","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4728"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9"},{"reference_url":"http://www.cert.org/advisories/CA-2002-25.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.cert.org/advisories/CA-2002-25.html"},{"reference_url":"http://www.debian.org/security/2002/dsa-142","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.debian.org/security/2002/dsa-142"},{"reference_url":"http://www.debian.org/security/2002/dsa-143","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.debian.org/security/2002/dsa-143"},{"reference_url":"http://www.debian.org/security/2002/dsa-146","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.debian.org/security/2002/dsa-146"},{"reference_url":"http://www.debian.org/security/2002/dsa-149","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.debian.org/security/2002/dsa-149"},{"reference_url":"http://www.debian.org/security/2003/dsa-333","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.debian.org/security/2003/dsa-333"},{"reference_url":"http://www.iss.net/security_center/static/9170.php","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.iss.net/security_center/static/9170.php"},{"reference_url":"http://www.kb.cert.org/vuls/id/192995","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.kb.cert.org/vuls/id/192995"},{"reference_url":"http://www.linuxsecurity.com/advisories/other_advisory-2399.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.linuxsecurity.com/advisories/other_advisory-2399.html"},{"reference_url":"http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:057","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:057"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2002-167.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.redhat.com/support/errata/RHSA-2002-167.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2002-173.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.redhat.com/support/errata/RHSA-2002-173.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2003-168.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.redhat.com/support/errata/RHSA-2003-168.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2003-212.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.redhat.com/support/errata/RHSA-2003-212.html"},{"reference_url":"http://www.securityfocus.com/bid/5356","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.securityfocus.com/bid/5356"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616771","reference_id":"1616771","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616771"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:solaris:9.0:*:*:*:*:sparc:*:*","reference_id":"cpe:2.3:o:sun:solaris:9.0:*:*:*:*:sparc:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:solaris:9.0:*:*:*:*:sparc:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2002-0391","reference_id":"CVE-2002-0391","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2002-0391"},{"reference_url":"https://access.redhat.com/errata/RHSA-2002:166","reference_id":"RHSA-2002:166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2002:166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2002:167","reference_id":"RHSA-2002:167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2002:167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2002:172","reference_id":"RHSA-2002:172","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2002:172"},{"reference_url":"https://access.redhat.com/errata/RHSA-2002:173","reference_id":"RHSA-2002:173","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2002:173"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:168","reference_id":"RHSA-2003:168","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:168"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:212","reference_id":"RHSA-2003:212","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:212"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923411?format=json","purl":"pkg:deb/debian/glibc@2.2.5-13?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.2.5-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2002-0391"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mrha-gp2j-vkf7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64297?format=json","vulnerability_id":"VCID-mt2t-g9ge-pfgz","summary":"glibc: nscd client crash on x86_64 under high nscd load","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3904.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-3904.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3904","reference_id":"","reference_type":"","scores":[{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.0188","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02611","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02594","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02608","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02616","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02635","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02329","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02327","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02313","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02319","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02416","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04838","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04876","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04888","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00018","scoring_system":"epss","scoring_elements":"0.04891","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-3904"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033931","reference_id":"1033931","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1033931"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2446533","reference_id":"2446533","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2446533"},{"reference_url":"https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0004;hb=HEAD","reference_id":"GLIBC-SA-2026-0004;hb=HEAD","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:56:03Z/"}],"url":"https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0004;hb=HEAD"},{"reference_url":"https://sourceware.org/git/?p=glibc.git;a=commit;h=8804157ad9da39631703b92315460808eac86b0c","reference_id":"?p=glibc.git;a=commit;h=8804157ad9da39631703b92315460808eac86b0c","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:56:03Z/"}],"url":"https://sourceware.org/git/?p=glibc.git;a=commit;h=8804157ad9da39631703b92315460808eac86b0c"},{"reference_url":"https://sourceware.org/git/?p=glibc.git;a=commit;h=b712be52645282c706a5faa038242504feb06db5","reference_id":"?p=glibc.git;a=commit;h=b712be52645282c706a5faa038242504feb06db5","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:56:03Z/"}],"url":"https://sourceware.org/git/?p=glibc.git;a=commit;h=b712be52645282c706a5faa038242504feb06db5"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7316","reference_id":"RHSA-2026:7316","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7316"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29863","reference_id":"show_bug.cgi?id=29863","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-11T15:56:03Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=29863"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923418?format=json","purl":"pkg:deb/debian/glibc@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923516?format=json","purl":"pkg:deb/debian/glibc@2.36-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2026-3904"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mt2t-g9ge-pfgz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54415?format=json","vulnerability_id":"VCID-mt93-6b2q-1faf","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0235.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0235.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0235","reference_id":"","reference_type":"","scores":[{"value":"0.8487","scoring_system":"epss","scoring_elements":"0.99349","published_at":"2026-04-21T12:55:00Z"},{"value":"0.8487","scoring_system":"epss","scoring_elements":"0.99347","published_at":"2026-04-13T12:55:00Z"},{"value":"0.8487","scoring_system":"epss","scoring_elements":"0.9935","published_at":"2026-04-18T12:55:00Z"},{"value":"0.86662","scoring_system":"epss","scoring_elements":"0.9942","published_at":"2026-04-11T12:55:00Z"},{"value":"0.86662","scoring_system":"epss","scoring_elements":"0.99427","published_at":"2026-05-05T12:55:00Z"},{"value":"0.86662","scoring_system":"epss","scoring_elements":"0.99415","published_at":"2026-04-02T12:55:00Z"},{"value":"0.86662","scoring_system":"epss","scoring_elements":"0.99417","published_at":"2026-04-04T12:55:00Z"},{"value":"0.86662","scoring_system":"epss","scoring_elements":"0.99426","published_at":"2026-04-29T12:55:00Z"},{"value":"0.86662","scoring_system":"epss","scoring_elements":"0.99416","published_at":"2026-04-01T12:55:00Z"},{"value":"0.86966","scoring_system":"epss","scoring_elements":"0.9943","published_at":"2026-04-07T12:55:00Z"},{"value":"0.86966","scoring_system":"epss","scoring_elements":"0.99432","published_at":"2026-04-09T12:55:00Z"},{"value":"0.86966","scoring_system":"epss","scoring_elements":"0.99431","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0235"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183461","reference_id":"1183461","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1183461"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35951.py","reference_id":"CVE-2015-0235;OSVDB-117579","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35951.py"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/36421.rb","reference_id":"CVE-2015-0235;OSVDB-117579","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/36421.rb"},{"reference_url":"https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt","reference_id":"CVE-2015-0235;OSVDB-117579","reference_type":"exploit","scores":[],"url":"https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0090","reference_id":"RHSA-2015:0090","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0090"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0092","reference_id":"RHSA-2015:0092","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0092"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0099","reference_id":"RHSA-2015:0099","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0099"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0101","reference_id":"RHSA-2015:0101","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0101"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0126","reference_id":"RHSA-2015:0126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0126"},{"reference_url":"https://usn.ubuntu.com/2485-1/","reference_id":"USN-2485-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2485-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923444?format=json","purl":"pkg:deb/debian/glibc@2.18-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.18-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2015-0235"],"risk_score":1.6,"exploitability":"2.0","weighted_severity":"0.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mt93-6b2q-1faf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89188?format=json","vulnerability_id":"VCID-mxa4-rpev-nkhw","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0403.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0403.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0403","reference_id":"","reference_type":"","scores":[{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15228","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15493","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15534","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15605","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15407","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15494","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15544","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15508","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15471","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15404","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15325","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.1533","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15377","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15419","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15417","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15362","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0403"},{"reference_url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=144059","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=144059"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9435","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9435"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-293.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-293.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617522","reference_id":"1617522","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617522"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0403","reference_id":"CVE-2005-0403","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0403"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:293","reference_id":"RHSA-2005:293","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:293"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923418?format=json","purl":"pkg:deb/debian/glibc@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2005-0403"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mxa4-rpev-nkhw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72610?format=json","vulnerability_id":"VCID-nfe7-dpqx-skfd","summary":"glibc: glibc in Fedora 41 ships a broken getrandom/arc4random for ppc64le platform","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-12455.json","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-12455.json"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2332111","reference_id":"2332111","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2332111"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923418?format=json","purl":"pkg:deb/debian/glibc@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2024-12455"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nfe7-dpqx-skfd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92882?format=json","vulnerability_id":"VCID-nj37-pefw-rfbt","summary":"pt_chown in the glibc package before 2.19-18+deb8u4 on Debian jessie; the elibc package before 2.15-0ubuntu10.14 on Ubuntu 12.04 LTS and before 2.19-0ubuntu6.8 on Ubuntu 14.04 LTS; and the glibc package before 2.21-0ubuntu4.2 on Ubuntu 15.10 and before 2.23-0ubuntu1 on Ubuntu 16.04 LTS and 16.10 lacks a namespace check associated with file-descriptor passing, which allows local users to capture keystrokes and spoof data, and possibly gain privileges, via pts read and write operations, related to debian/sysdeps/linux.mk.  NOTE: this is not considered a vulnerability in the upstream GNU C Library because the upstream documentation has a clear security recommendation against the --enable-pt_chown option.","references":[{"reference_url":"http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=09f7764882a81e13e7b5d87d715412283a6ce403","reference_id":"","reference_type":"","scores":[],"url":"http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=09f7764882a81e13e7b5d87d715412283a6ce403"},{"reference_url":"http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=11475c083282c1582c4dd72eecfcb2b7d308c958","reference_id":"","reference_type":"","scores":[],"url":"http://anonscm.debian.org/cgit/pkg-glibc/glibc.git/commit/?h=jessie&id=11475c083282c1582c4dd72eecfcb2b7d308c958"},{"reference_url":"http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2856.html","reference_id":"","reference_type":"","scores":[],"url":"http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-2856.html"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2856","reference_id":"","reference_type":"","scores":[{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71729","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71745","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71617","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71623","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71641","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71614","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71654","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71665","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71688","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71672","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71653","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71697","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71703","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71684","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71734","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00684","scoring_system":"epss","scoring_elements":"0.71739","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2856"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/02/23/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/02/23/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/03/07/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/03/07/2"},{"reference_url":"http://www.securityfocus.com/bid/84601","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/84601"},{"reference_url":"http://www.ubuntu.com/usn/USN-2985-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2985-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2985-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2985-2"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41760.txt","reference_id":"CVE-2016-2856","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41760.txt"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2856","reference_id":"CVE-2016-2856","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"8.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2856"},{"reference_url":"http://www.halfdog.net/Security/2015/PtChownArbitraryPtsAccessViaUserNamespace/","reference_id":"CVE-2016-2856","reference_type":"exploit","scores":[],"url":"http://www.halfdog.net/Security/2015/PtChownArbitraryPtsAccessViaUserNamespace/"},{"reference_url":"https://usn.ubuntu.com/2985-1/","reference_id":"USN-2985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2985-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923442?format=json","purl":"pkg:deb/debian/glibc@2.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2016-2856"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nj37-pefw-rfbt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48727?format=json","vulnerability_id":"VCID-njhs-qxym-mbdf","summary":"Multiple vulnerabilities were found in glibc, the worst of which allowing\n    local attackers to execute arbitrary code as root.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4881.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4881.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4881","reference_id":"","reference_type":"","scores":[{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69655","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.6952","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69531","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69546","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69525","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69575","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69592","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69614","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69599","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69585","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69624","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69633","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69666","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69675","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.6968","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-4881"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4881","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4881"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201011-01.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201011-01.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/59241","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/59241"},{"reference_url":"http://sources.redhat.com/bugzilla/show_bug.cgi?id=10600","reference_id":"","reference_type":"","scores":[],"url":"http://sources.redhat.com/bugzilla/show_bug.cgi?id=10600"},{"reference_url":"http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=153aa31b93be22e01b236375fb02a9f9b9a0195f","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=153aa31b93be22e01b236375fb02a9f9b9a0195f"},{"reference_url":"http://www.debian.org/security/2010/dsa-2058","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2058"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:111","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:111"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=599095","reference_id":"599095","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=599095"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-4881","reference_id":"CVE-2009-4881","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-4881"},{"reference_url":"https://security.gentoo.org/glsa/201011-01","reference_id":"GLSA-201011-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201011-01"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923425?format=json","purl":"pkg:deb/debian/glibc@2.11.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.11.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2009-4881"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-njhs-qxym-mbdf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/79939?format=json","vulnerability_id":"VCID-nk5x-uhcf-7kan","summary":"glibc: conversion from ISO-2022-JP-3 with iconv may emit spurious NUL character on state reset","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43396.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-43396.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-43396","reference_id":"","reference_type":"","scores":[{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69441","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69463","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69299","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69311","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69329","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69309","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69359","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69376","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69398","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69383","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69369","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69407","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69418","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69399","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.6945","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69458","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-43396"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43396","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43396"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2020652","reference_id":"2020652","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2020652"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=998622","reference_id":"998622","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=998622"},{"reference_url":"https://security.archlinux.org/AVG-1621","reference_id":"AVG-1621","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1621"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923485?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923489?format=json","purl":"pkg:deb/debian/glibc@2.32-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.32-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2021-43396"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nk5x-uhcf-7kan"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61774?format=json","vulnerability_id":"VCID-nrvz-y7zn-6bgu","summary":"Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4788.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4788.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4788","reference_id":"","reference_type":"","scores":[{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.9179","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91799","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91804","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91813","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91825","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91832","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91835","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91837","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91833","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91853","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.9185","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91855","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91854","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91849","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0756","scoring_system":"epss","scoring_elements":"0.91863","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4788"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4788"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717178","reference_id":"717178","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=717178"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=985625","reference_id":"985625","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=985625"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/28657.c","reference_id":"CVE-2013-4788;OSVDB-95392","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/28657.c"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923439?format=json","purl":"pkg:deb/debian/glibc@2.17-94?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.17-94%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2013-4788"],"risk_score":0.2,"exploitability":"2.0","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nrvz-y7zn-6bgu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85548?format=json","vulnerability_id":"VCID-pnk4-ss5m-d3an","summary":"glibc: calloc may return non-zero memory","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0176.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0176.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5229.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5229.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5229","reference_id":"","reference_type":"","scores":[{"value":"0.01","scoring_system":"epss","scoring_elements":"0.77066","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01","scoring_system":"epss","scoring_elements":"0.77062","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01","scoring_system":"epss","scoring_elements":"0.77076","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01","scoring_system":"epss","scoring_elements":"0.76921","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01","scoring_system":"epss","scoring_elements":"0.76928","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01","scoring_system":"epss","scoring_elements":"0.76957","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01","scoring_system":"epss","scoring_elements":"0.76939","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01","scoring_system":"epss","scoring_elements":"0.76971","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01","scoring_system":"epss","scoring_elements":"0.76983","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01","scoring_system":"epss","scoring_elements":"0.7701","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01","scoring_system":"epss","scoring_elements":"0.76989","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01","scoring_system":"epss","scoring_elements":"0.76984","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01","scoring_system":"epss","scoring_elements":"0.77025","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01","scoring_system":"epss","scoring_elements":"0.77027","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01","scoring_system":"epss","scoring_elements":"0.7702","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01","scoring_system":"epss","scoring_elements":"0.77055","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5229"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1246713","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1246713"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1293976","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1293976"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10150","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10150"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"reference_url":"http://www.securityfocus.com/bid/84172","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/84172"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1256285","reference_id":"1256285","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1256285"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5229","reference_id":"CVE-2015-5229","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5229"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0176","reference_id":"RHSA-2016:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0176"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923418?format=json","purl":"pkg:deb/debian/glibc@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2015-5229"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pnk4-ss5m-d3an"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58063?format=json","vulnerability_id":"VCID-ppaj-d4b9-wuhf","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1781.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1781.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1781","reference_id":"","reference_type":"","scores":[{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91636","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91643","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91649","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91657","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.9167","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91677","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.9168","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91682","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91679","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.917","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91692","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91693","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91698","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91696","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91694","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07304","scoring_system":"epss","scoring_elements":"0.91706","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-1781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1199525","reference_id":"1199525","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1199525"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796105","reference_id":"796105","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796105"},{"reference_url":"https://security.gentoo.org/glsa/201602-02","reference_id":"GLSA-201602-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0863","reference_id":"RHSA-2015:0863","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0863"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2199","reference_id":"RHSA-2015:2199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2589","reference_id":"RHSA-2015:2589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2589"},{"reference_url":"https://usn.ubuntu.com/2985-1/","reference_id":"USN-2985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2985-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923453?format=json","purl":"pkg:deb/debian/glibc@2.19-20?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-20%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2015-1781"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ppaj-d4b9-wuhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62164?format=json","vulnerability_id":"VCID-pw6m-42j9-f7af","summary":"Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3998.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3998.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3998","reference_id":"","reference_type":"","scores":[{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41511","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41794","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41859","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41888","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41817","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41866","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41876","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.419","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41865","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41853","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41903","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41805","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41731","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41733","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41653","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3998"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024633","reference_id":"2024633","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:59:39Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024633"},{"reference_url":"https://www.openwall.com/lists/oss-security/2022/01/24/4","reference_id":"4","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:59:39Z/"}],"url":"https://www.openwall.com/lists/oss-security/2022/01/24/4"},{"reference_url":"https://security.archlinux.org/AVG-1621","reference_id":"AVG-1621","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1621"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2021-3998","reference_id":"CVE-2021-3998","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:59:39Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2021-3998"},{"reference_url":"https://security-tracker.debian.org/tracker/CVE-2021-3998","reference_id":"CVE-2021-3998","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:59:39Z/"}],"url":"https://security-tracker.debian.org/tracker/CVE-2021-3998"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=84d2d0fe20bdf94feed82b21b4d7d136db471f03","reference_id":"gitweb.cgi?p=glibc.git%3Bh=84d2d0fe20bdf94feed82b21b4d7d136db471f03","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:59:39Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=84d2d0fe20bdf94feed82b21b4d7d136db471f03"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=ee8d5e33adb284601c00c94687bc907e10aec9bb","reference_id":"gitweb.cgi?p=glibc.git%3Bh=ee8d5e33adb284601c00c94687bc907e10aec9bb","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:59:39Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=ee8d5e33adb284601c00c94687bc907e10aec9bb"},{"reference_url":"https://security.gentoo.org/glsa/202208-24","reference_id":"GLSA-202208-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-24"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221020-0003/","reference_id":"ntap-20221020-0003","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:59:39Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221020-0003/"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=28770","reference_id":"show_bug.cgi?id=28770","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:59:39Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=28770"},{"reference_url":"https://usn.ubuntu.com/5310-1/","reference_id":"USN-5310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923418?format=json","purl":"pkg:deb/debian/glibc@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923487?format=json","purl":"pkg:deb/debian/glibc@2.33-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.33-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2021-3998"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pw6m-42j9-f7af"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61417?format=json","vulnerability_id":"VCID-pyms-pya1-buck","summary":"Multiple vulnerabilities have been found in glibc, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1751.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1751.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-1751","reference_id":"","reference_type":"","scores":[{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33535","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33687","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33719","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33558","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33601","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33634","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3363","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33589","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33566","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33599","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33575","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47585","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47732","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47714","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47723","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00244","scoring_system":"epss","scoring_elements":"0.47669","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-1751"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1751"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1810719","reference_id":"1810719","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1810719"},{"reference_url":"https://security.gentoo.org/glsa/202006-04","reference_id":"GLSA-202006-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202006-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4444","reference_id":"RHSA-2020:4444","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4444"},{"reference_url":"https://usn.ubuntu.com/4416-1/","reference_id":"USN-4416-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4416-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923479?format=json","purl":"pkg:deb/debian/glibc@2.30-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.30-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2020-1751"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pyms-pya1-buck"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69464?format=json","vulnerability_id":"VCID-pz43-weh8-cqgj","summary":"glibc: Vector register overwrite bug in glibc","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5702.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5702.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-5702","reference_id":"","reference_type":"","scores":[{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52452","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52402","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52488","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52497","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52459","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.5248","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52447","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52499","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52493","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52544","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52528","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52512","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52551","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52556","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.5254","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-5702"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107365","reference_id":"1107365","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107365"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2370472","reference_id":"2370472","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2370472"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11066","reference_id":"RHSA-2025:11066","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11066"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11487","reference_id":"RHSA-2025:11487","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11487"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9877","reference_id":"RHSA-2025:9877","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9877"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33056","reference_id":"show_bug.cgi?id=33056","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-05T20:17:18Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33056"},{"reference_url":"https://usn.ubuntu.com/7634-1/","reference_id":"USN-7634-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7634-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923418?format=json","purl":"pkg:deb/debian/glibc@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923513?format=json","purl":"pkg:deb/debian/glibc@2.41-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2025-5702"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pz43-weh8-cqgj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78693?format=json","vulnerability_id":"VCID-q3am-4g9r-rffg","summary":"glibc: incorrect printf output for integers with thousands separator and width field","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25139.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25139.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-25139","reference_id":"","reference_type":"","scores":[{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35489","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36002","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35977","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36016","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36001","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35951","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35723","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35691","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35602","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36096","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36126","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.35962","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36011","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36035","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.3604","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-25139"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/02/10/1","reference_id":"1","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-26T14:48:30Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/02/10/1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2167666","reference_id":"2167666","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2167666"},{"reference_url":"https://security.archlinux.org/AVG-2833","reference_id":"AVG-2833","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2833"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230302-0010/","reference_id":"ntap-20230302-0010","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-26T14:48:30Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230302-0010/"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=30068","reference_id":"show_bug.cgi?id=30068","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-26T14:48:30Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=30068"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923418?format=json","purl":"pkg:deb/debian/glibc@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2023-25139"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q3am-4g9r-rffg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84471?format=json","vulnerability_id":"VCID-q5az-xe7k-m7av","summary":"glibc: Fragmentation attacks possible when EDNS0 is enabled","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12132.json","reference_id":"","reference_type":"","scores":[{"value":"3.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12132.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12132","reference_id":"","reference_type":"","scores":[{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52657","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.5265","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52735","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52706","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52702","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52729","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52694","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52745","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.5274","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.5279","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52774","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52758","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52795","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52803","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00294","scoring_system":"epss","scoring_elements":"0.52786","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-12132"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1477529","reference_id":"1477529","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1477529"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870650","reference_id":"870650","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=870650"},{"reference_url":"https://security.archlinux.org/AVG-368","reference_id":"AVG-368","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-368"},{"reference_url":"https://security.archlinux.org/AVG-369","reference_id":"AVG-369","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-369"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0805","reference_id":"RHSA-2018:0805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0805"},{"reference_url":"https://usn.ubuntu.com/5768-1/","reference_id":"USN-5768-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5768-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923467?format=json","purl":"pkg:deb/debian/glibc@2.25-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.25-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2017-12132"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q5az-xe7k-m7av"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31491?format=json","vulnerability_id":"VCID-qaaq-fss4-1kgr","summary":"Multiple vulnerabilities have been found in glibc, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6485.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6485.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6485","reference_id":"","reference_type":"","scores":[{"value":"0.01095","scoring_system":"epss","scoring_elements":"0.77936","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01095","scoring_system":"epss","scoring_elements":"0.77943","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01095","scoring_system":"epss","scoring_elements":"0.77971","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01095","scoring_system":"epss","scoring_elements":"0.77952","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01095","scoring_system":"epss","scoring_elements":"0.77979","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01095","scoring_system":"epss","scoring_elements":"0.77983","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01095","scoring_system":"epss","scoring_elements":"0.7801","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01095","scoring_system":"epss","scoring_elements":"0.77993","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01095","scoring_system":"epss","scoring_elements":"0.77992","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01095","scoring_system":"epss","scoring_elements":"0.78027","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01095","scoring_system":"epss","scoring_elements":"0.78026","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01095","scoring_system":"epss","scoring_elements":"0.78019","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01095","scoring_system":"epss","scoring_elements":"0.78051","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01095","scoring_system":"epss","scoring_elements":"0.78059","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01095","scoring_system":"epss","scoring_elements":"0.78072","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01095","scoring_system":"epss","scoring_elements":"0.78083","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6485"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1542102","reference_id":"1542102","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1542102"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878159","reference_id":"878159","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878159"},{"reference_url":"https://security.gentoo.org/glsa/201804-02","reference_id":"GLSA-201804-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3092","reference_id":"RHSA-2018:3092","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3092"},{"reference_url":"https://usn.ubuntu.com/4218-1/","reference_id":"USN-4218-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4218-1/"},{"reference_url":"https://usn.ubuntu.com/4416-1/","reference_id":"USN-4416-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4416-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923474?format=json","purl":"pkg:deb/debian/glibc@2.27-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.27-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2018-6485"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qaaq-fss4-1kgr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49146?format=json","vulnerability_id":"VCID-qeyh-2f6t-bbbb","summary":"Multiple vulnerabilities in glibc could result in Local Privilege Escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5156.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5156.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5156","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16403","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.1714","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.16971","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17027","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17045","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18304","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18144","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18199","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18204","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18157","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18106","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18049","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18062","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18359","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18061","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-5156"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053002","reference_id":"1053002","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053002"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240541","reference_id":"2240541","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-15T20:03:45Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2240541"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-5156","reference_id":"CVE-2023-5156","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-15T20:03:45Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-5156"},{"reference_url":"https://security.gentoo.org/glsa/202402-01","reference_id":"GLSA-202402-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-01"},{"reference_url":"https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=ec6b95c3303c700eb89eebeda2d7264cc184a796","reference_id":"?p=glibc.git;a=commitdiff;h=ec6b95c3303c700eb89eebeda2d7264cc184a796","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-15T20:03:45Z/"}],"url":"https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=ec6b95c3303c700eb89eebeda2d7264cc184a796"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=30884","reference_id":"show_bug.cgi?id=30884","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-10-15T20:03:45Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=30884"},{"reference_url":"https://usn.ubuntu.com/6541-1/","reference_id":"USN-6541-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6541-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923418?format=json","purl":"pkg:deb/debian/glibc@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923497?format=json","purl":"pkg:deb/debian/glibc@2.37-11?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.37-11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2023-5156"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qeyh-2f6t-bbbb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31492?format=json","vulnerability_id":"VCID-qwx5-bayb-bkcg","summary":"Multiple vulnerabilities have been found in glibc, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6551.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6551.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6551","reference_id":"","reference_type":"","scores":[{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61605","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61679","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.6171","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61681","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.6173","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61745","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61767","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61754","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61735","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61776","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61782","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61764","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61759","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61768","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00416","scoring_system":"epss","scoring_elements":"0.61712","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6551"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6551","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6551"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1542119","reference_id":"1542119","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1542119"},{"reference_url":"https://security.gentoo.org/glsa/201804-02","reference_id":"GLSA-201804-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-02"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923474?format=json","purl":"pkg:deb/debian/glibc@2.27-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.27-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2018-6551"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qwx5-bayb-bkcg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58064?format=json","vulnerability_id":"VCID-r44h-gkxy-8kh2","summary":"security update","references":[{"reference_url":"http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow","reference_id":"","reference_type":"","scores":[],"url":"http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177412.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177412.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00043.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00044.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=145596041017029&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=145596041017029&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=145672440608228&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=145672440608228&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=145690841819314&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=145690841819314&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=145857691004892&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=145857691004892&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=146161017210491&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=146161017210491&w=2"},{"reference_url":"http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-Stack-Based-Buffer-Overflow.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-Stack-Based-Buffer-Overflow.html"},{"reference_url":"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"},{"reference_url":"http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html"},{"reference_url":"http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0175.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0175.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0176.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0176.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0225.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0225.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-0277.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-0277.html"},{"reference_url":"https://access.redhat.com/articles/2161461","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/articles/2161461"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7547.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7547.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7547","reference_id":"","reference_type":"","scores":[{"value":"0.93908","scoring_system":"epss","scoring_elements":"0.99875","published_at":"2026-04-04T12:55:00Z"},{"value":"0.93908","scoring_system":"epss","scoring_elements":"0.99874","published_at":"2026-04-01T12:55:00Z"},{"value":"0.93952","scoring_system":"epss","scoring_elements":"0.99886","published_at":"2026-05-05T12:55:00Z"},{"value":"0.93952","scoring_system":"epss","scoring_elements":"0.99884","published_at":"2026-04-16T12:55:00Z"},{"value":"0.93952","scoring_system":"epss","scoring_elements":"0.99885","published_at":"2026-04-29T12:55:00Z"},{"value":"0.93952","scoring_system":"epss","scoring_elements":"0.99882","published_at":"2026-04-08T12:55:00Z"},{"value":"0.93952","scoring_system":"epss","scoring_elements":"0.99883","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7547"},{"reference_url":"https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/","reference_id":"","reference_type":"","scores":[],"url":"https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/"},{"reference_url":"https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/","reference_id":"","reference_type":"","scores":[],"url":"https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa114","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa114"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Sep/7","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Sep/7"},{"reference_url":"http://seclists.org/fulldisclosure/2021/Sep/0","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2021/Sep/0"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Jun/36","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2022/Jun/36"},{"reference_url":"https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html","reference_id":"","reference_type":"","scores":[],"url":"https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html"},{"reference_url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05028479","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05028479"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05008367","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05008367"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05053211","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05053211"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05212266","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05212266"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722"},{"reference_url":"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes","reference_id":"","reference_type":"","scores":[],"url":"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"},{"reference_url":"https://ics-cert.us-cert.gov/advisories/ICSA-16-103-01","reference_id":"","reference_type":"","scores":[],"url":"https://ics-cert.us-cert.gov/advisories/ICSA-16-103-01"},{"reference_url":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40161","reference_id":"","reference_type":"","scores":[],"url":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40161"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10150","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10150"},{"reference_url":"https://seclists.org/bugtraq/2019/Sep/7","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Sep/7"},{"reference_url":"https://security.netapp.com/advisory/ntap-20160217-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20160217-0002/"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=18665","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=18665"},{"reference_url":"https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/ml/libc-alpha/2016-02/msg00416.html"},{"reference_url":"https://support.f5.com/kb/en-us/solutions/public/k/47/sol47098834.html","reference_id":"","reference_type":"","scores":[],"url":"https://support.f5.com/kb/en-us/solutions/public/k/47/sol47098834.html"},{"reference_url":"https://support.lenovo.com/us/en/product_security/len_5450","reference_id":"","reference_type":"","scores":[],"url":"https://support.lenovo.com/us/en/product_security/len_5450"},{"reference_url":"http://support.citrix.com/article/CTX206991","reference_id":"","reference_type":"","scores":[],"url":"http://support.citrix.com/article/CTX206991"},{"reference_url":"https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17","reference_id":"","reference_type":"","scores":[],"url":"https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17"},{"reference_url":"https://www.exploit-db.com/exploits/39454/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/39454/"},{"reference_url":"https://www.exploit-db.com/exploits/40339/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/40339/"},{"reference_url":"https://www.kb.cert.org/vuls/id/457759","reference_id":"","reference_type":"","scores":[],"url":"https://www.kb.cert.org/vuls/id/457759"},{"reference_url":"https://www.tenable.com/security/research/tra-2017-08","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/research/tra-2017-08"},{"reference_url":"http://ubuntu.com/usn/usn-2900-1","reference_id":"","reference_type":"","scores":[],"url":"http://ubuntu.com/usn/usn-2900-1"},{"reference_url":"http://www.debian.org/security/2016/dsa-3480","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3480"},{"reference_url":"http://www.debian.org/security/2016/dsa-3481","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3481"},{"reference_url":"http://www.fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow","reference_id":"","reference_type":"","scores":[],"url":"http://www.fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow"},{"reference_url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160304-01-glibc-en","reference_id":"","reference_type":"","scores":[],"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160304-01-glibc-en"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"},{"reference_url":"http://www.securityfocus.com/bid/83265","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/83265"},{"reference_url":"http://www.securitytracker.com/id/1035020","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1035020"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2016-0002.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2016-0002.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1293532","reference_id":"1293532","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1293532"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_access_policy_manager:12.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_advanced_firewall_manager:12.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_analytics:12.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_acceleration_manager:12.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_application_security_manager:12.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:12.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:f5:big-ip_domain_name_system:12.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_domain_name_system:12.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_link_controller:12.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_local_traffic_manager:12.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:f5:big-ip_policy_enforcement_manager:12.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:hp:helion_openstack:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:2.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:hp:helion_openstack:2.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:2.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:2.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:hp:helion_openstack:2.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:helion_openstack:2.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:server_migration_pack:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:hp:server_migration_pack:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:server_migration_pack:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:exalogic_infrastructure:1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:exalogic_infrastructure:1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:exalogic_infrastructure:1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:exalogic_infrastructure:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:exalogic_infrastructure:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:exalogic_infrastructure:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sophos:unified_threat_management_software:9.319:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sophos:unified_threat_management_software:9.319:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sophos:unified_threat_management_software:9.319:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sophos:unified_threat_management_software:9.355:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sophos:unified_threat_management_software:9.355:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sophos:unified_threat_management_software:9.355:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11.0:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:fujitsu_m10_firmware:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:fujitsu_m10_firmware:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:fujitsu_m10_firmware:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11.0:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp2:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11.0:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/39454.txt","reference_id":"CVE-2015-7547","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/39454.txt"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/40339.py","reference_id":"CVE-2015-7547","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/40339.py"},{"reference_url":"https://googleonlinesecurity.blogspot.kr/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html","reference_id":"CVE-2015-7547","reference_type":"exploit","scores":[],"url":"https://googleonlinesecurity.blogspot.kr/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html"},{"reference_url":"https://googleonlinesecurity.blogspot.sg/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html","reference_id":"CVE-2015-7547","reference_type":"exploit","scores":[],"url":"https://googleonlinesecurity.blogspot.sg/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7547","reference_id":"CVE-2015-7547","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7547"},{"reference_url":"https://security.gentoo.org/glsa/201602-02","reference_id":"GLSA-201602-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0175","reference_id":"RHSA-2016:0175","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0175"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0176","reference_id":"RHSA-2016:0176","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0176"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0225","reference_id":"RHSA-2016:0225","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0225"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:0277","reference_id":"RHSA-2016:0277","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:0277"},{"reference_url":"https://usn.ubuntu.com/2900-1/","reference_id":"USN-2900-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2900-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923456?format=json","purl":"pkg:deb/debian/glibc@2.21-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.21-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2015-7547"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r44h-gkxy-8kh2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89387?format=json","vulnerability_id":"VCID-r6kw-vaat-mbav","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1382.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-1382.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-1382","reference_id":"","reference_type":"","scores":[{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25052","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25135","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25175","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24947","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25015","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.2506","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25075","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25034","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.2498","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24992","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24984","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24956","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24894","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24883","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24838","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24715","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-1382"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1382","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1382"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617410","reference_id":"1617410","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617410"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:261","reference_id":"RHSA-2005:261","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:261"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923416?format=json","purl":"pkg:deb/debian/glibc@2.3.2.ds1-19?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.3.2.ds1-19%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2004-1382"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r6kw-vaat-mbav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61765?format=json","vulnerability_id":"VCID-rp43-q42n-jkh5","summary":"Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085190.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085190.html"},{"reference_url":"http://osvdb.org/84710","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/84710"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1207.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1207.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1208.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1208.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1262.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1262.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1325.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1325.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3480.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3480.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3480","reference_id":"","reference_type":"","scores":[{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42307","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42413","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42388","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42316","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.4225","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42381","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42411","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.4235","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42399","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42407","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42429","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42393","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42364","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52481","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52442","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00291","scoring_system":"epss","scoring_elements":"0.52385","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3480"},{"reference_url":"http://secunia.com/advisories/50201","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50201"},{"reference_url":"http://secunia.com/advisories/50422","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/50422"},{"reference_url":"http://sourceware.org/bugzilla/show_bug.cgi?id=14459","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/bugzilla/show_bug.cgi?id=14459"},{"reference_url":"http://sourceware.org/ml/libc-alpha/2012-08/msg00202.html","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/ml/libc-alpha/2012-08/msg00202.html"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/08/13/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/08/13/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2012/08/13/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2012/08/13/6"},{"reference_url":"http://www.securityfocus.com/bid/54982","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/54982"},{"reference_url":"http://www.securitytracker.com/id?1027374","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1027374"},{"reference_url":"http://www.ubuntu.com/usn/USN-1589-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1589-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=847715","reference_id":"847715","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=847715"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3480","reference_id":"CVE-2012-3480","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3480"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/37631.c","reference_id":"CVE-2012-3480;OSVDB-84710","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/37631.c"},{"reference_url":"https://www.securityfocus.com/bid/54982/info","reference_id":"CVE-2012-3480;OSVDB-84710","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/54982/info"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1207","reference_id":"RHSA-2012:1207","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1207"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1208","reference_id":"RHSA-2012:1208","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1208"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1325","reference_id":"RHSA-2012:1325","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1325"},{"reference_url":"https://usn.ubuntu.com/1589-1/","reference_id":"USN-1589-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1589-1/"},{"reference_url":"https://usn.ubuntu.com/1589-2/","reference_id":"USN-1589-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1589-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923438?format=json","purl":"pkg:deb/debian/glibc@2.13-36?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.13-36%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2012-3480"],"risk_score":8.2,"exploitability":"2.0","weighted_severity":"4.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rp43-q42n-jkh5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87562?format=json","vulnerability_id":"VCID-rq92-5scc-8uc7","summary":"glibc: De-recursivise regular expression engine","references":[{"reference_url":"http://cxib.net/stuff/proftpd.gnu.c","reference_id":"","reference_type":"","scores":[],"url":"http://cxib.net/stuff/proftpd.gnu.c"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4052.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-4052.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4052","reference_id":"","reference_type":"","scores":[{"value":"0.09951","scoring_system":"epss","scoring_elements":"0.93053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09951","scoring_system":"epss","scoring_elements":"0.93002","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09951","scoring_system":"epss","scoring_elements":"0.93011","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09951","scoring_system":"epss","scoring_elements":"0.93014","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09951","scoring_system":"epss","scoring_elements":"0.93022","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09951","scoring_system":"epss","scoring_elements":"0.93026","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09951","scoring_system":"epss","scoring_elements":"0.93031","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09951","scoring_system":"epss","scoring_elements":"0.93029","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09951","scoring_system":"epss","scoring_elements":"0.9303","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09951","scoring_system":"epss","scoring_elements":"0.9304","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09951","scoring_system":"epss","scoring_elements":"0.93043","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09951","scoring_system":"epss","scoring_elements":"0.9305","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09951","scoring_system":"epss","scoring_elements":"0.93057","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-4052"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4052","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4052"},{"reference_url":"http://seclists.org/fulldisclosure/2011/Jan/78","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2011/Jan/78"},{"reference_url":"http://secunia.com/advisories/42547","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/42547"},{"reference_url":"http://securityreason.com/achievement_securityalert/93","reference_id":"","reference_type":"","scores":[],"url":"http://securityreason.com/achievement_securityalert/93"},{"reference_url":"http://securitytracker.com/id?1024832","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1024832"},{"reference_url":"http://www.exploit-db.com/exploits/15935","reference_id":"","reference_type":"","scores":[],"url":"http://www.exploit-db.com/exploits/15935"},{"reference_url":"http://www.kb.cert.org/vuls/id/912279","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/912279"},{"reference_url":"http://www.securityfocus.com/archive/1/515589/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/515589/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/45233","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/45233"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=645859","reference_id":"645859","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=645859"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*"},{"reference_url":"http://securityreason.com/securityalert/8003","reference_id":"CVE-2010-4051;CVE-2010-4052","reference_type":"exploit","scores":[],"url":"http://securityreason.com/securityalert/8003"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4052","reference_id":"CVE-2010-4052","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-4052"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35061.c","reference_id":"CVE-2010-4052;OSVDB-70447","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/35061.c"},{"reference_url":"https://www.securityfocus.com/bid/45233/info","reference_id":"CVE-2010-4052;OSVDB-70447","reference_type":"exploit","scores":[],"url":"https://www.securityfocus.com/bid/45233/info"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923431?format=json","purl":"pkg:deb/debian/glibc@2.19-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2010-4052"],"risk_score":9.0,"exploitability":"2.0","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rq92-5scc-8uc7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39606?format=json","vulnerability_id":"VCID-rqh3-5xc2-uyab","summary":"Multiple vulnerabilities have been found in the GNU C Library, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000366.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000366.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000366","reference_id":"","reference_type":"","scores":[{"value":"0.07617","scoring_system":"epss","scoring_elements":"0.91821","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07617","scoring_system":"epss","scoring_elements":"0.91862","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07617","scoring_system":"epss","scoring_elements":"0.91835","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07617","scoring_system":"epss","scoring_elements":"0.91844","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07617","scoring_system":"epss","scoring_elements":"0.91856","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07617","scoring_system":"epss","scoring_elements":"0.91865","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07617","scoring_system":"epss","scoring_elements":"0.91866","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07617","scoring_system":"epss","scoring_elements":"0.91881","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07617","scoring_system":"epss","scoring_elements":"0.91877","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07617","scoring_system":"epss","scoring_elements":"0.91875","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07617","scoring_system":"epss","scoring_elements":"0.91829","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08874","scoring_system":"epss","scoring_elements":"0.92573","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08874","scoring_system":"epss","scoring_elements":"0.92583","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08874","scoring_system":"epss","scoring_elements":"0.92575","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08874","scoring_system":"epss","scoring_elements":"0.92576","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-1000366"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:C/I:C/A:C"},{"value":"8.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1452543","reference_id":"1452543","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1452543"},{"reference_url":"https://security.archlinux.org/ASA-201706-22","reference_id":"ASA-201706-22","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201706-22"},{"reference_url":"https://security.archlinux.org/ASA-201706-23","reference_id":"ASA-201706-23","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201706-23"},{"reference_url":"https://security.archlinux.org/AVG-307","reference_id":"AVG-307","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-307"},{"reference_url":"https://security.archlinux.org/AVG-308","reference_id":"AVG-308","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-308"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/local/42274.c","reference_id":"CVE-2017-1000370;CVE-2017-1000366","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/local/42274.c"},{"reference_url":"https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap.c","reference_id":"CVE-2017-1000370;CVE-2017-1000366","reference_type":"exploit","scores":[],"url":"https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap.c"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/local/42276.c","reference_id":"CVE-2017-1000371;CVE-2017-1000366","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86/local/42276.c"},{"reference_url":"https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_dynamic.c","reference_id":"CVE-2017-1000371;CVE-2017-1000366","reference_type":"exploit","scores":[],"url":"https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_dynamic.c"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/42275.c","reference_id":"CVE-2017-1000379;CVE-2017-1000366","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux_x86-64/local/42275.c"},{"reference_url":"https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap_64.c","reference_id":"CVE-2017-1000379;CVE-2017-1000366","reference_type":"exploit","scores":[],"url":"https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap_64.c"},{"reference_url":"https://security.gentoo.org/glsa/201706-19","reference_id":"GLSA-201706-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1479","reference_id":"RHSA-2017:1479","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1479"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1480","reference_id":"RHSA-2017:1480","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1480"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1481","reference_id":"RHSA-2017:1481","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1481"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1567","reference_id":"RHSA-2017:1567","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1567"},{"reference_url":"https://usn.ubuntu.com/3323-1/","reference_id":"USN-3323-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3323-1/"},{"reference_url":"https://usn.ubuntu.com/3323-2/","reference_id":"USN-3323-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3323-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923465?format=json","purl":"pkg:deb/debian/glibc@2.24-12?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.24-12%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2017-1000366"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rqh3-5xc2-uyab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61413?format=json","vulnerability_id":"VCID-rt4z-2rd4-qfde","summary":"Multiple vulnerabilities have been found in glibc, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6488.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-6488.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6488","reference_id":"","reference_type":"","scores":[{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35327","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.34966","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35168","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35087","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35526","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35552","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35434","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.3548","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35505","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35514","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35471","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35449","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35489","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35478","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35426","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.3519","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-6488"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6488","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6488"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=24097","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=24097"},{"reference_url":"http://www.securityfocus.com/bid/106671","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/106671"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1667931","reference_id":"1667931","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1667931"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6488","reference_id":"CVE-2019-6488","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-6488"},{"reference_url":"https://security.gentoo.org/glsa/202006-04","reference_id":"GLSA-202006-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202006-04"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923459?format=json","purl":"pkg:deb/debian/glibc@2.28-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2019-6488"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rt4z-2rd4-qfde"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58066?format=json","vulnerability_id":"VCID-ru1q-qgq2-h7ct","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0680.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2017-0680.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8776.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8776.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8776","reference_id":"","reference_type":"","scores":[{"value":"0.04265","scoring_system":"epss","scoring_elements":"0.88869","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04265","scoring_system":"epss","scoring_elements":"0.88853","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04265","scoring_system":"epss","scoring_elements":"0.88858","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05306","scoring_system":"epss","scoring_elements":"0.90041","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05306","scoring_system":"epss","scoring_elements":"0.90044","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07412","scoring_system":"epss","scoring_elements":"0.91723","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07412","scoring_system":"epss","scoring_elements":"0.91735","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07412","scoring_system":"epss","scoring_elements":"0.91742","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07412","scoring_system":"epss","scoring_elements":"0.91745","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07412","scoring_system":"epss","scoring_elements":"0.91747","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07412","scoring_system":"epss","scoring_elements":"0.91743","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07412","scoring_system":"epss","scoring_elements":"0.91764","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07412","scoring_system":"epss","scoring_elements":"0.91702","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07412","scoring_system":"epss","scoring_elements":"0.9171","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07412","scoring_system":"epss","scoring_elements":"0.91715","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=18985","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=18985"},{"reference_url":"https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html"},{"reference_url":"http://www.debian.org/security/2016/dsa-3480","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3480"},{"reference_url":"http://www.debian.org/security/2016/dsa-3481","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3481"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/19/11","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/19/11"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/20/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/20/1"},{"reference_url":"http://www.securityfocus.com/bid/83277","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/83277"},{"reference_url":"http://www.ubuntu.com/usn/USN-2985-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2985-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2985-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2985-2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300299","reference_id":"1300299","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300299"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812445","reference_id":"812445","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812445"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8776","reference_id":"CVE-2015-8776","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:P"},{"value":"9.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8776"},{"reference_url":"https://security.gentoo.org/glsa/201602-02","reference_id":"GLSA-201602-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-02"},{"reference_url":"https://security.gentoo.org/glsa/201702-11","reference_id":"GLSA-201702-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201702-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0680","reference_id":"RHSA-2017:0680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1916","reference_id":"RHSA-2017:1916","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1916"},{"reference_url":"https://usn.ubuntu.com/2985-1/","reference_id":"USN-2985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2985-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923457?format=json","purl":"pkg:deb/debian/glibc@2.21-7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.21-7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2015-8776"],"risk_score":4.1,"exploitability":"0.5","weighted_severity":"8.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ru1q-qgq2-h7ct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43776?format=json","vulnerability_id":"VCID-sbzq-gp2e-v7fy","summary":"Multiple vulnerabilities in glibc could result in Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-25013.json","reference_id":"","reference_type":"","scores":[{"value":"4.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-25013.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-25013","reference_id":"","reference_type":"","scores":[{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74084","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74212","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74116","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74139","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74157","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74136","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74121","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74088","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.7409","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74213","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74205","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.7417","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74179","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74171","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00805","scoring_system":"epss","scoring_elements":"0.74133","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-25013"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1912960","reference_id":"1912960","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1912960"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/","reference_id":"4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979273","reference_id":"979273","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=979273"},{"reference_url":"https://security.archlinux.org/ASA-202102-16","reference_id":"ASA-202102-16","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202102-16"},{"reference_url":"https://security.archlinux.org/ASA-202102-17","reference_id":"ASA-202102-17","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202102-17"},{"reference_url":"https://security.archlinux.org/AVG-1320","reference_id":"AVG-1320","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1320"},{"reference_url":"https://security.gentoo.org/glsa/202107-07","reference_id":"GLSA-202107-07","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/"}],"url":"https://security.gentoo.org/glsa/202107-07"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210205-0004/","reference_id":"ntap-20210205-0004","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/"}],"url":"https://security.netapp.com/advisory/ntap-20210205-0004/"},{"reference_url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=ee7a3144c9922808181009b7b3e50e852fb4999b","reference_id":"?p=glibc.git%3Ba=commit%3Bh=ee7a3144c9922808181009b7b3e50e852fb4999b","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/"}],"url":"https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=ee7a3144c9922808181009b7b3e50e852fb4999b"},{"reference_url":"https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f%40%3Cjira.kafka.apache.org%3E","reference_id":"r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f%40%3Cjira.kafka.apache.org%3E","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/"}],"url":"https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f%40%3Cjira.kafka.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7%40%3Cdev.kafka.apache.org%3E","reference_id":"r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7%40%3Cdev.kafka.apache.org%3E","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/"}],"url":"https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7%40%3Cdev.kafka.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2%40%3Cjira.kafka.apache.org%3E","reference_id":"r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2%40%3Cjira.kafka.apache.org%3E","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/"}],"url":"https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2%40%3Cjira.kafka.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9%40%3Cjira.kafka.apache.org%3E","reference_id":"r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9%40%3Cjira.kafka.apache.org%3E","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/"}],"url":"https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9%40%3Cjira.kafka.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff%40%3Cjira.kafka.apache.org%3E","reference_id":"r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff%40%3Cjira.kafka.apache.org%3E","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/"}],"url":"https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff%40%3Cjira.kafka.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece%40%3Cissues.zookeeper.apache.org%3E","reference_id":"r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece%40%3Cissues.zookeeper.apache.org%3E","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/"}],"url":"https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece%40%3Cissues.zookeeper.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc%40%3Cdev.zookeeper.apache.org%3E","reference_id":"r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc%40%3Cdev.zookeeper.apache.org%3E","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/"}],"url":"https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc%40%3Cdev.zookeeper.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c%40%3Cissues.zookeeper.apache.org%3E","reference_id":"rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c%40%3Cissues.zookeeper.apache.org%3E","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/"}],"url":"https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c%40%3Cissues.zookeeper.apache.org%3E"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0348","reference_id":"RHSA-2021:0348","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0348"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0949","reference_id":"RHSA-2021:0949","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0949"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1585","reference_id":"RHSA-2021:1585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1585"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=24973","reference_id":"show_bug.cgi?id=24973","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=24973"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/","reference_id":"TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:16:13Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/"},{"reference_url":"https://usn.ubuntu.com/5310-1/","reference_id":"USN-5310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-1/"},{"reference_url":"https://usn.ubuntu.com/5768-1/","reference_id":"USN-5768-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5768-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923476?format=json","purl":"pkg:deb/debian/glibc@2.31-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2019-25013"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sbzq-gp2e-v7fy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43039?format=json","vulnerability_id":"VCID-sjav-8bub-eycz","summary":"Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2961.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2961.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2961","reference_id":"","reference_type":"","scores":[{"value":"0.91755","scoring_system":"epss","scoring_elements":"0.99689","published_at":"2026-04-21T12:55:00Z"},{"value":"0.91924","scoring_system":"epss","scoring_elements":"0.99701","published_at":"2026-04-29T12:55:00Z"},{"value":"0.91924","scoring_system":"epss","scoring_elements":"0.99703","published_at":"2026-05-05T12:55:00Z"},{"value":"0.91924","scoring_system":"epss","scoring_elements":"0.997","published_at":"2026-04-24T12:55:00Z"},{"value":"0.92156","scoring_system":"epss","scoring_elements":"0.99711","published_at":"2026-04-16T12:55:00Z"},{"value":"0.92156","scoring_system":"epss","scoring_elements":"0.99712","published_at":"2026-04-18T12:55:00Z"},{"value":"0.92156","scoring_system":"epss","scoring_elements":"0.9971","published_at":"2026-04-13T12:55:00Z"},{"value":"0.92156","scoring_system":"epss","scoring_elements":"0.99707","published_at":"2026-04-04T12:55:00Z"},{"value":"0.92156","scoring_system":"epss","scoring_elements":"0.99709","published_at":"2026-04-09T12:55:00Z"},{"value":"0.92578","scoring_system":"epss","scoring_elements":"0.99739","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2961"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/05/27/1","reference_id":"1","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/05/27/1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069191","reference_id":"1069191","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069191"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/04/24/2","reference_id":"2","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/04/24/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/05/27/2","reference_id":"2","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/05/27/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273404","reference_id":"2273404","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273404"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/05/27/3","reference_id":"3","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/05/27/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/04/18/4","reference_id":"4","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/04/18/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/05/27/4","reference_id":"4","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/05/27/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/05/27/5","reference_id":"5","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/05/27/5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/07/22/5","reference_id":"5","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/07/22/5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/05/27/6","reference_id":"6","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/05/27/6"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/04/17/9","reference_id":"9","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/04/17/9"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/","reference_id":"BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/"},{"reference_url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004","reference_id":"GLIBC-SA-2024-0004","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004"},{"reference_url":"https://security.gentoo.org/glsa/202405-17","reference_id":"GLSA-202405-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-17"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html","reference_id":"msg00001.html","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240531-0002/","reference_id":"ntap-20240531-0002","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240531-0002/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/","reference_id":"P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2722","reference_id":"RHSA-2024:2722","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2722"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2799","reference_id":"RHSA-2024:2799","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2799"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3269","reference_id":"RHSA-2024:3269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3309","reference_id":"RHSA-2024:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3312","reference_id":"RHSA-2024:3312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3339","reference_id":"RHSA-2024:3339","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3339"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3411","reference_id":"RHSA-2024:3411","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3411"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3423","reference_id":"RHSA-2024:3423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3464","reference_id":"RHSA-2024:3464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3588","reference_id":"RHSA-2024:3588","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4126","reference_id":"RHSA-2024:4126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7590","reference_id":"RHSA-2024:7590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7594","reference_id":"RHSA-2024:7594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7599","reference_id":"RHSA-2024:7599","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7599"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7939","reference_id":"RHSA-2024:7939","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7939"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8235","reference_id":"RHSA-2024:8235","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8235"},{"reference_url":"https://usn.ubuntu.com/6737-1/","reference_id":"USN-6737-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6737-1/"},{"reference_url":"https://usn.ubuntu.com/6737-2/","reference_id":"USN-6737-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6737-2/"},{"reference_url":"https://usn.ubuntu.com/6762-1/","reference_id":"USN-6762-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6762-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/","reference_id":"YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923501?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923500?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923502?format=json","purl":"pkg:deb/debian/glibc@2.37-18?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.37-18%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2024-2961"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sjav-8bub-eycz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61764?format=json","vulnerability_id":"VCID-skgp-p9xp-k3cf","summary":"Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3405.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3405.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3405","reference_id":"","reference_type":"","scores":[{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71191","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.712","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71218","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71192","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71234","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71249","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71271","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71256","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.7124","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71287","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71293","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.7127","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71323","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.7133","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71334","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.7132","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3405"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3405","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3405"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681473","reference_id":"681473","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681473"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=833704","reference_id":"833704","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=833704"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1098","reference_id":"RHSA-2012:1098","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1098"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1200","reference_id":"RHSA-2012:1200","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1200"},{"reference_url":"https://usn.ubuntu.com/1589-1/","reference_id":"USN-1589-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1589-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923436?format=json","purl":"pkg:deb/debian/glibc@2.13-35?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.13-35%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2012-3405"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-skgp-p9xp-k3cf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69463?format=json","vulnerability_id":"VCID-sphp-4b55-9fer","summary":"glibc: Vector register overwrite bug in glibc","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5745.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5745.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-5745","reference_id":"","reference_type":"","scores":[{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48792","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48692","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48816","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48825","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48776","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48817","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48771","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48826","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48823","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.4884","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48815","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48872","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48869","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48828","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-5745"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107366","reference_id":"1107366","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107366"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2370488","reference_id":"2370488","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2370488"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33060","reference_id":"show_bug.cgi?id=33060","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-05T20:11:39Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=33060"},{"reference_url":"https://usn.ubuntu.com/7634-1/","reference_id":"USN-7634-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7634-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923418?format=json","purl":"pkg:deb/debian/glibc@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923513?format=json","purl":"pkg:deb/debian/glibc@2.41-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2025-5745"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sphp-4b55-9fer"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61769?format=json","vulnerability_id":"VCID-tdxd-r347-3yex","summary":"Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .","references":[{"reference_url":"http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0769.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0769.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1605.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-1605.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1914.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1914.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1914","reference_id":"","reference_type":"","scores":[{"value":"0.03104","scoring_system":"epss","scoring_elements":"0.86877","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03104","scoring_system":"epss","scoring_elements":"0.86827","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03104","scoring_system":"epss","scoring_elements":"0.86831","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03104","scoring_system":"epss","scoring_elements":"0.8683","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03104","scoring_system":"epss","scoring_elements":"0.86847","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03104","scoring_system":"epss","scoring_elements":"0.86853","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03398","scoring_system":"epss","scoring_elements":"0.87359","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03398","scoring_system":"epss","scoring_elements":"0.87413","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03398","scoring_system":"epss","scoring_elements":"0.87417","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03398","scoring_system":"epss","scoring_elements":"0.87369","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03398","scoring_system":"epss","scoring_elements":"0.87384","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03398","scoring_system":"epss","scoring_elements":"0.87403","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03398","scoring_system":"epss","scoring_elements":"0.8741","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03398","scoring_system":"epss","scoring_elements":"0.87422","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1914"},{"reference_url":"https://bugzilla.novell.com/show_bug.cgi?id=813121","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.novell.com/show_bug.cgi?id=813121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914"},{"reference_url":"http://seclists.org/fulldisclosure/2021/Sep/0","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2021/Sep/0"},{"reference_url":"http://secunia.com/advisories/52817","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/52817"},{"reference_url":"http://secunia.com/advisories/55113","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/55113"},{"reference_url":"http://sourceware.org/bugzilla/show_bug.cgi?id=15330","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/bugzilla/show_bug.cgi?id=15330"},{"reference_url":"http://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=1cef1b19089528db11f221e938f60b9b048945d7","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=1cef1b19089528db11f221e938f60b9b048945d7"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:163","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:163"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:283","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:283"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:284","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:284"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/04/03/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/04/03/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/04/03/8","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/04/03/8"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/04/05/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/04/05/1"},{"reference_url":"http://www.securityfocus.com/bid/58839","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/58839"},{"reference_url":"http://www.ubuntu.com/usn/USN-1991-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1991-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2014-0008.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2014-0008.html"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704623","reference_id":"704623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704623"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=947882","reference_id":"947882","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=947882"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1914","reference_id":"CVE-2013-1914","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1914"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0769","reference_id":"RHSA-2013:0769","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0769"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1605","reference_id":"RHSA-2013:1605","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1605"},{"reference_url":"https://usn.ubuntu.com/1991-1/","reference_id":"USN-1991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1991-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923441?format=json","purl":"pkg:deb/debian/glibc@2.17-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.17-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2013-1914"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tdxd-r347-3yex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49148?format=json","vulnerability_id":"VCID-tgp7-xmws-kued","summary":"Multiple vulnerabilities in glibc could result in Local Privilege Escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6779.json","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6779.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6779","reference_id":"","reference_type":"","scores":[{"value":"0.00654","scoring_system":"epss","scoring_elements":"0.70989","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00654","scoring_system":"epss","scoring_elements":"0.70943","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00654","scoring_system":"epss","scoring_elements":"0.70927","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00654","scoring_system":"epss","scoring_elements":"0.70911","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00654","scoring_system":"epss","scoring_elements":"0.70958","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00654","scoring_system":"epss","scoring_elements":"0.70965","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00654","scoring_system":"epss","scoring_elements":"0.70944","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00654","scoring_system":"epss","scoring_elements":"0.70999","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00654","scoring_system":"epss","scoring_elements":"0.71009","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00654","scoring_system":"epss","scoring_elements":"0.71007","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72183","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72227","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72215","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72178","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0071","scoring_system":"epss","scoring_elements":"0.72203","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6779"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254395","reference_id":"2254395","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-13T16:08:30Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254395"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Feb/3","reference_id":"3","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-13T16:08:30Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Feb/3"},{"reference_url":"https://www.openwall.com/lists/oss-security/2024/01/30/6","reference_id":"6","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-13T16:08:30Z/"}],"url":"https://www.openwall.com/lists/oss-security/2024/01/30/6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8","reference_id":"cpe:/o:redhat:enterprise_linux:8","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9","reference_id":"cpe:/o:redhat:enterprise_linux:9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-6779","reference_id":"CVE-2023-6779","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-13T16:08:30Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-6779"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/","reference_id":"D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-13T16:08:30Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/"},{"reference_url":"http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html","reference_id":"glibc-syslog-Heap-Based-Buffer-Overflow.html","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-13T16:08:30Z/"}],"url":"http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html"},{"reference_url":"https://security.gentoo.org/glsa/202402-01","reference_id":"GLSA-202402-01","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-13T16:08:30Z/"}],"url":"https://security.gentoo.org/glsa/202402-01"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/","reference_id":"MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-13T16:08:30Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240223-0006/","reference_id":"ntap-20240223-0006","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-13T16:08:30Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240223-0006/"},{"reference_url":"https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt","reference_id":"syslog.txt","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-13T16:08:30Z/"}],"url":"https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt"},{"reference_url":"https://usn.ubuntu.com/6620-1/","reference_id":"USN-6620-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6620-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923418?format=json","purl":"pkg:deb/debian/glibc@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923498?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923499?format=json","purl":"pkg:deb/debian/glibc@2.37-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.37-15%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2023-6779"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tgp7-xmws-kued"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85787?format=json","vulnerability_id":"VCID-tp9v-vmge-nkdf","summary":"glibc: _IO_wstr_overflow integer overflow","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8983.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8983.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8983","reference_id":"","reference_type":"","scores":[{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67053","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.6704","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67054","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.66918","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.66956","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.66981","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.66955","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67005","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67017","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67037","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67022","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.66992","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67025","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.67039","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00525","scoring_system":"epss","scoring_elements":"0.6702","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8983"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=17269","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=17269"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bdf1ff052a8e23d637f2c838fa5642d78fcedc33","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=bdf1ff052a8e23d637f2c838fa5642d78fcedc33"},{"reference_url":"https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.sourceware.org/ml/libc-alpha/2015-08/msg00609.html"},{"reference_url":"http://www.openwall.com/lists/oss-security/2017/02/14/9","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2017/02/14/9"},{"reference_url":"http://www.securityfocus.com/bid/72740","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/72740"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195762","reference_id":"1195762","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1195762"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779587","reference_id":"779587","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779587"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8983","reference_id":"CVE-2015-8983","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8983"},{"reference_url":"https://usn.ubuntu.com/3239-1/","reference_id":"USN-3239-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3239-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923442?format=json","purl":"pkg:deb/debian/glibc@2.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2015-8983"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tp9v-vmge-nkdf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88888?format=json","vulnerability_id":"VCID-twn9-zhjq-uqe6","summary":"glibc: Not closing unhadleable client sockets due to nscd daemon leads to DoS.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7254.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7254.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-7254","reference_id":"","reference_type":"","scores":[{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12872","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12609","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12812","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12706","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12966","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.13014","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12815","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12893","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12944","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12902","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12867","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12821","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12725","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.12728","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1283","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.1285","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-7254"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7254","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7254"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=2498","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=2498"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1698738","reference_id":"1698738","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1698738"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2006-7254","reference_id":"CVE-2006-7254","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-7254"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923420?format=json","purl":"pkg:deb/debian/glibc@2.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2006-7254"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-twn9-zhjq-uqe6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83453?format=json","vulnerability_id":"VCID-uqdb-tx7y-bbbc","summary":"glibc: Buffer overflow in __mempcpy_avx512_no_vzeroupper","references":[{"reference_url":"https://access.redhat.com/errata/RHBA-2019:0327","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHBA-2019:0327"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11237.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-11237.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-11237","reference_id":"","reference_type":"","scores":[{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.73959","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74088","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74055","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74047","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.7408","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.73966","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.73991","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.73963","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.73997","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.7401","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74032","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74014","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74007","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00797","scoring_system":"epss","scoring_elements":"0.74046","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-11237"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11237","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11237"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190329-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190329-0001/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190401-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20190401-0001/"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=23196","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=23196"},{"reference_url":"https://www.exploit-db.com/exploits/44750/","reference_id":"","reference_type":"","scores":[],"url":"https://www.exploit-db.com/exploits/44750/"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"reference_url":"http://www.securityfocus.com/bid/104256","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/104256"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1581274","reference_id":"1581274","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1581274"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=899070","reference_id":"899070","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=899070"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:data_ontap_edge:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software_management:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_session_border_controller:8.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:enterprise_communications_broker:3.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11237","reference_id":"CVE-2018-11237","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-11237"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3092","reference_id":"RHSA-2018:3092","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3092"},{"reference_url":"https://usn.ubuntu.com/4416-1/","reference_id":"USN-4416-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4416-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923473?format=json","purl":"pkg:deb/debian/glibc@2.27-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.27-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2018-11237"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uqdb-tx7y-bbbc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36350?format=json","vulnerability_id":"VCID-utss-75dn-r3b7","summary":"Multiple vulnerabilities have been found in glibc, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8985.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8985.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8985","reference_id":"","reference_type":"","scores":[{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41594","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41812","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41731","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.4188","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41945","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41972","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41899","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41949","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.4196","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41983","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41931","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41981","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41953","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.41883","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00198","scoring_system":"epss","scoring_elements":"0.4182","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8985"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779392"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8985"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2017/02/14/9","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2017/02/14/9"},{"reference_url":"http://www.securityfocus.com/bid/76916","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/76916"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1197798","reference_id":"1197798","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1197798"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8985","reference_id":"CVE-2015-8985","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8985"},{"reference_url":"https://security.gentoo.org/glsa/201908-06","reference_id":"GLSA-201908-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201908-06"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923428?format=json","purl":"pkg:deb/debian/glibc@2.28-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2015-8985"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-utss-75dn-r3b7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82654?format=json","vulnerability_id":"VCID-v7ut-qjzy-2yfs","summary":"glibc: buffer overflow in getgrouplist function leading to corrupted memory","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3590.json","reference_id":"","reference_type":"","scores":[{"value":"5.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3590.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3590","reference_id":"","reference_type":"","scores":[{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62132","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62245","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62306","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.623","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62192","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62223","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.6219","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62239","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62256","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62275","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62265","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62243","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62288","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62295","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62281","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.6229","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-3590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3590"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=661","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=661"},{"reference_url":"https://support.f5.com/csp/article/K12740406","reference_id":"","reference_type":"","scores":[],"url":"https://support.f5.com/csp/article/K12740406"},{"reference_url":"http://www.securityfocus.com/bid/107871","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/107871"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1706046","reference_id":"1706046","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1706046"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3590","reference_id":"CVE-2005-3590","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3590"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923419?format=json","purl":"pkg:deb/debian/glibc@2.3.5-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.3.5-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2005-3590"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v7ut-qjzy-2yfs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59733?format=json","vulnerability_id":"VCID-v96m-se3g-8ydp","summary":"Multiple vulnerabilities have been found in glibc, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10228.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10228.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10228","reference_id":"","reference_type":"","scores":[{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61384","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61543","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61525","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.6154","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61535","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61461","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61489","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61459","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61507","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61522","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61529","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61509","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.6155","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61554","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61538","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63231","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-10228"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10228"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"},{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1428290","reference_id":"1428290","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1428290"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856503","reference_id":"856503","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856503"},{"reference_url":"https://security.gentoo.org/glsa/202101-20","reference_id":"GLSA-202101-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202101-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:1585","reference_id":"RHSA-2021:1585","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:1585"},{"reference_url":"https://usn.ubuntu.com/5310-1/","reference_id":"USN-5310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-1/"},{"reference_url":"https://usn.ubuntu.com/5768-1/","reference_id":"USN-5768-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5768-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923458?format=json","purl":"pkg:deb/debian/glibc@2.31-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2016-10228"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v96m-se3g-8ydp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36352?format=json","vulnerability_id":"VCID-vajf-thpr-pbat","summary":"Multiple vulnerabilities have been found in glibc, the worst of\n    which could result in a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19591.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-19591.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-19591","reference_id":"","reference_type":"","scores":[{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80186","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80141","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80161","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80134","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80205","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.8015","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01364","scoring_system":"epss","scoring_elements":"0.80178","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82677","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82771","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82752","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82745","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82736","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82714","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82711","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.8271","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01775","scoring_system":"epss","scoring_elements":"0.82673","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-19591"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19591","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19591"},{"reference_url":"http://www.securitytracker.com/id/1042174","reference_id":"1042174","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/"}],"url":"http://www.securitytracker.com/id/1042174"},{"reference_url":"http://www.securityfocus.com/bid/106037","reference_id":"106037","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/"}],"url":"http://www.securityfocus.com/bid/106037"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1653993","reference_id":"1653993","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1653993"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914837","reference_id":"914837","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=914837"},{"reference_url":"https://security.archlinux.org/AVG-830","reference_id":"AVG-830","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-830"},{"reference_url":"https://security.archlinux.org/AVG-831","reference_id":"AVG-831","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-831"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO7WHN52GFMC5F2I2232GFIPSSXWFV7G/","reference_id":"BO7WHN52GFMC5F2I2232GFIPSSXWFV7G","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO7WHN52GFMC5F2I2232GFIPSSXWFV7G/"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=d527c860f5a3f0ed687bd03f0cb464612dc23408","reference_id":"gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=d527c860f5a3f0ed687bd03f0cb464612dc23408","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/"}],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=d527c860f5a3f0ed687bd03f0cb464612dc23408"},{"reference_url":"https://security.gentoo.org/glsa/201903-09","reference_id":"GLSA-201903-09","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/"}],"url":"https://security.gentoo.org/glsa/201903-09"},{"reference_url":"https://security.gentoo.org/glsa/201908-06","reference_id":"GLSA-201908-06","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/"}],"url":"https://security.gentoo.org/glsa/201908-06"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M52KE4YR3GNMHQUOS3DKAGZD5TQ5D5UH/","reference_id":"M52KE4YR3GNMHQUOS3DKAGZD5TQ5D5UH","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M52KE4YR3GNMHQUOS3DKAGZD5TQ5D5UH/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20190321-0003/","reference_id":"ntap-20190321-0003","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/"}],"url":"https://security.netapp.com/advisory/ntap-20190321-0003/"},{"reference_url":"https://sourceware.org/git/?p=glibc.git%3Ba=blob_plain%3Bf=NEWS%3Bhb=HEAD","reference_id":"?p=glibc.git%3Ba=blob_plain%3Bf=NEWS%3Bhb=HEAD","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/"}],"url":"https://sourceware.org/git/?p=glibc.git%3Ba=blob_plain%3Bf=NEWS%3Bhb=HEAD"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=23927","reference_id":"show_bug.cgi?id=23927","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=23927"},{"reference_url":"https://usn.ubuntu.com/4416-1/","reference_id":"USN-4416-1","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-03T19:12:51Z/"}],"url":"https://usn.ubuntu.com/4416-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923428?format=json","purl":"pkg:deb/debian/glibc@2.28-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.28-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2018-19591"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vajf-thpr-pbat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39601?format=json","vulnerability_id":"VCID-vake-u1n1-x3hx","summary":"Multiple vulnerabilities have been found in the GNU C Library, the\n    worst of which may allow execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5180.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5180.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5180","reference_id":"","reference_type":"","scores":[{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.6116","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.6124","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61269","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61236","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61284","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61299","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61318","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61304","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61285","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00737","scoring_system":"epss","scoring_elements":"0.72929","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00737","scoring_system":"epss","scoring_elements":"0.7292","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00737","scoring_system":"epss","scoring_elements":"0.72926","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00737","scoring_system":"epss","scoring_elements":"0.72921","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00737","scoring_system":"epss","scoring_elements":"0.72876","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00737","scoring_system":"epss","scoring_elements":"0.72885","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00737","scoring_system":"epss","scoring_elements":"0.72878","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5180"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1249603","reference_id":"1249603","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1249603"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796106","reference_id":"796106","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=796106"},{"reference_url":"https://security.gentoo.org/glsa/201706-19","reference_id":"GLSA-201706-19","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201706-19"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0805","reference_id":"RHSA-2018:0805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0805"},{"reference_url":"https://usn.ubuntu.com/3239-1/","reference_id":"USN-3239-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3239-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923455?format=json","purl":"pkg:deb/debian/glibc@2.24-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.24-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2015-5180"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vake-u1n1-x3hx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48729?format=json","vulnerability_id":"VCID-vcf1-m7tr-zbgc","summary":"Multiple vulnerabilities were found in glibc, the worst of which allowing\n    local attackers to execute arbitrary code as root.","references":[{"reference_url":"http://frugalware.org/security/662","reference_id":"","reference_type":"","scores":[],"url":"http://frugalware.org/security/662"},{"reference_url":"http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0296.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0296.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0296","reference_id":"","reference_type":"","scores":[{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.29953","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30497","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30523","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30569","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30379","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30439","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30474","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30476","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30432","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30383","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30401","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30382","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30342","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30282","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30169","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00117","scoring_system":"epss","scoring_elements":"0.30092","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0296"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0296"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Jun/18","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Jun/18"},{"reference_url":"http://secunia.com/advisories/39900","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/39900"},{"reference_url":"http://secunia.com/advisories/43830","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43830"},{"reference_url":"http://secunia.com/advisories/46397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/46397"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201011-01.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201011-01.xml"},{"reference_url":"http://securitytracker.com/id?1024043","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1024043"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/59240","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/59240"},{"reference_url":"https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html"},{"reference_url":"http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=ab00f4eac8f4932211259ff87be83144f5211540","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=ab00f4eac8f4932211259ff87be83144f5211540"},{"reference_url":"https://seclists.org/bugtraq/2019/Jun/14","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Jun/14"},{"reference_url":"http://www.debian.org/security/2010/dsa-2058","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2058"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:111","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:111"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:112","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:112"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0412.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0412.html"},{"reference_url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded"},{"reference_url":"http://www.ubuntu.com/usn/USN-944-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-944-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1246","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1246"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0863","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0863"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=559579","reference_id":"559579","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=559579"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583908","reference_id":"583908","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=583908"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-0296","reference_id":"CVE-2010-0296","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-0296"},{"reference_url":"https://security.gentoo.org/glsa/201011-01","reference_id":"GLSA-201011-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201011-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0412","reference_id":"RHSA-2011:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0125","reference_id":"RHSA-2012:0125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0125"},{"reference_url":"https://usn.ubuntu.com/944-1/","reference_id":"USN-944-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/944-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923424?format=json","purl":"pkg:deb/debian/glibc@2.11-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.11-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2010-0296"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vcf1-m7tr-zbgc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61186?format=json","vulnerability_id":"VCID-ven5-emb5-a7bh","summary":"Multiple vulnerabilities have been found in the GNU C Library, the\n    worst of which allows context-dependent attackers to execute arbitrary\n    code.","references":[{"reference_url":"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-2172.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2015-2172.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5277.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5277.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5277","reference_id":"","reference_type":"","scores":[{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27465","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28039","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.2811","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28154","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.2795","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28017","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28059","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28065","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28022","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27965","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27974","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27957","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27908","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27823","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27711","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27637","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5277"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Sep/7","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Sep/7"},{"reference_url":"https://seclists.org/bugtraq/2019/Sep/7","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Sep/7"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=17079","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=17079"},{"reference_url":"https://sourceware.org/ml/libc-alpha/2014-09/msg00088.html","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/ml/libc-alpha/2014-09/msg00088.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"},{"reference_url":"http://www.securityfocus.com/bid/78092","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/78092"},{"reference_url":"http://www.securitytracker.com/id/1034196","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034196"},{"reference_url":"http://www.ubuntu.com/usn/USN-2985-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2985-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2985-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2985-2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1262914","reference_id":"1262914","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1262914"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799966","reference_id":"799966","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799966"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5277","reference_id":"CVE-2015-5277","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5277"},{"reference_url":"https://security.gentoo.org/glsa/201702-11","reference_id":"GLSA-201702-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201702-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2172","reference_id":"RHSA-2015:2172","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2172"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:2589","reference_id":"RHSA-2015:2589","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:2589"},{"reference_url":"https://usn.ubuntu.com/2985-1/","reference_id":"USN-2985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2985-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923442?format=json","purl":"pkg:deb/debian/glibc@2.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2015-5277"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ven5-emb5-a7bh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59734?format=json","vulnerability_id":"VCID-vqyv-kf5w-vkch","summary":"Multiple vulnerabilities have been found in glibc, the worst of\n    which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1752.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1752.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-1752","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32464","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32946","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.328","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32687","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32603","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40469","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40532","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40552","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40515","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40495","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40543","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40511","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40442","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.4052","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40521","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40548","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-1752"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1752"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1810718","reference_id":"1810718","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1810718"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953788","reference_id":"953788","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=953788"},{"reference_url":"https://security.gentoo.org/glsa/202101-20","reference_id":"GLSA-202101-20","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202101-20"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4444","reference_id":"RHSA-2020:4444","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4444"},{"reference_url":"https://usn.ubuntu.com/4416-1/","reference_id":"USN-4416-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4416-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923479?format=json","purl":"pkg:deb/debian/glibc@2.30-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.30-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2020-1752"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vqyv-kf5w-vkch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57869?format=json","vulnerability_id":"VCID-vttu-hcan-6fba","summary":"security update","references":[{"reference_url":"http://googleprojectzero.blogspot.com/2014/08/the-poisoned-nul-byte-2014-edition.html","reference_id":"","reference_type":"","scores":[],"url":"http://googleprojectzero.blogspot.com/2014/08/the-poisoned-nul-byte-2014-edition.html"},{"reference_url":"http://linux.oracle.com/errata/ELSA-2015-0092.html","reference_id":"","reference_type":"","scores":[],"url":"http://linux.oracle.com/errata/ELSA-2015-0092.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00017.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00017.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1118.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-1118.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5119.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5119.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5119","reference_id":"","reference_type":"","scores":[{"value":"0.21511","scoring_system":"epss","scoring_elements":"0.95743","published_at":"2026-05-05T12:55:00Z"},{"value":"0.21511","scoring_system":"epss","scoring_elements":"0.95723","published_at":"2026-04-16T12:55:00Z"},{"value":"0.21511","scoring_system":"epss","scoring_elements":"0.95727","published_at":"2026-04-18T12:55:00Z"},{"value":"0.21511","scoring_system":"epss","scoring_elements":"0.95728","published_at":"2026-04-29T12:55:00Z"},{"value":"0.21511","scoring_system":"epss","scoring_elements":"0.9573","published_at":"2026-04-24T12:55:00Z"},{"value":"0.21511","scoring_system":"epss","scoring_elements":"0.95729","published_at":"2026-04-26T12:55:00Z"},{"value":"0.22024","scoring_system":"epss","scoring_elements":"0.95778","published_at":"2026-04-11T12:55:00Z"},{"value":"0.22024","scoring_system":"epss","scoring_elements":"0.95743","published_at":"2026-04-01T12:55:00Z"},{"value":"0.22024","scoring_system":"epss","scoring_elements":"0.95779","published_at":"2026-04-13T12:55:00Z"},{"value":"0.22024","scoring_system":"epss","scoring_elements":"0.95777","published_at":"2026-04-12T12:55:00Z"},{"value":"0.22024","scoring_system":"epss","scoring_elements":"0.95752","published_at":"2026-04-02T12:55:00Z"},{"value":"0.22024","scoring_system":"epss","scoring_elements":"0.95759","published_at":"2026-04-04T12:55:00Z"},{"value":"0.22024","scoring_system":"epss","scoring_elements":"0.95762","published_at":"2026-04-07T12:55:00Z"},{"value":"0.22024","scoring_system":"epss","scoring_elements":"0.9577","published_at":"2026-04-08T12:55:00Z"},{"value":"0.22024","scoring_system":"epss","scoring_elements":"0.95774","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5119"},{"reference_url":"https://code.google.com/p/google-security-research/issues/detail?id=96","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/google-security-research/issues/detail?id=96"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119"},{"reference_url":"http://seclists.org/fulldisclosure/2014/Aug/69","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2014/Aug/69"},{"reference_url":"http://secunia.com/advisories/60345","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60345"},{"reference_url":"http://secunia.com/advisories/60358","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60358"},{"reference_url":"http://secunia.com/advisories/60441","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60441"},{"reference_url":"http://secunia.com/advisories/61074","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61074"},{"reference_url":"http://secunia.com/advisories/61093","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/61093"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2014-1110.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2014-1110.html"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=17187","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=17187"},{"reference_url":"http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-5119","reference_id":"","reference_type":"","scores":[],"url":"http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-5119"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21685604","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21685604"},{"reference_url":"http://www.debian.org/security/2014/dsa-3012","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3012"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:175","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:175"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/07/14/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/07/14/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/08/13/5","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/08/13/5"},{"reference_url":"http://www.securityfocus.com/bid/68983","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/68983"},{"reference_url":"http://www.securityfocus.com/bid/69738","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/69738"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1119128","reference_id":"1119128","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1119128"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5119","reference_id":"CVE-2014-5119","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5119"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/34421.c","reference_id":"CVE-2014-5119;OSVDB-109188","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/34421.c"},{"reference_url":"https://security.gentoo.org/glsa/201602-02","reference_id":"GLSA-201602-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1110","reference_id":"RHSA-2014:1110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1118","reference_id":"RHSA-2014:1118","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1118"},{"reference_url":"https://usn.ubuntu.com/2328-1/","reference_id":"USN-2328-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2328-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923449?format=json","purl":"pkg:deb/debian/glibc@2.19-10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2014-5119"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vttu-hcan-6fba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89404?format=json","vulnerability_id":"VCID-vvkk-5k95-fqfk","summary":"security flaw","references":[{"reference_url":"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136318","reference_id":"","reference_type":"","scores":[],"url":"http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=136318"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0968.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0968.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0968","reference_id":"","reference_type":"","scores":[{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21677","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21945","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22106","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22155","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21937","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22018","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22072","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22087","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22046","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21986","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21984","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.2198","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21935","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21788","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21776","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21769","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0968"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0968","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0968"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200410-19.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200410-19.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17583","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17583"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9523","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9523"},{"reference_url":"https://www.ubuntu.com/usn/usn-4-1/","reference_id":"","reference_type":"","scores":[],"url":"https://www.ubuntu.com/usn/usn-4-1/"},{"reference_url":"http://www.debian.org/security/2005/dsa-636","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-636"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2004-586.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2004-586.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-261.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-261.html"},{"reference_url":"http://www.securityfocus.com/bid/11286","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/11286"},{"reference_url":"http://www.trustix.org/errata/2004/0050","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2004/0050"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617335","reference_id":"1617335","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617335"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2004-0968","reference_id":"CVE-2004-0968","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2004-0968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2004:586","reference_id":"RHSA-2004:586","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2004:586"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:261","reference_id":"RHSA-2005:261","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:261"},{"reference_url":"https://usn.ubuntu.com/4-1/","reference_id":"USN-4-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923416?format=json","purl":"pkg:deb/debian/glibc@2.3.2.ds1-19?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.3.2.ds1-19%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2004-0968"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vvkk-5k95-fqfk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34314?format=json","vulnerability_id":"VCID-w16u-mjyw-pben","summary":"Multiple vulnerabilities in glibc could result in Local Privilege Escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4527.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-4527.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4527","reference_id":"","reference_type":"","scores":[{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28043","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28694","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28615","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28655","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28657","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28613","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28565","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28585","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28561","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28743","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.2855","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28773","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28886","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.28703","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00108","scoring_system":"epss","scoring_elements":"0.29006","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-4527"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051958","reference_id":"1051958","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051958"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2234712","reference_id":"2234712","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T14:44:32Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2234712"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:9::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2023-4527","reference_id":"CVE-2023-4527","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T14:44:32Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2023-4527"},{"reference_url":"https://security.gentoo.org/glsa/202310-03","reference_id":"GLSA-202310-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202310-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5453","reference_id":"RHSA-2023:5453","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T14:44:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:5453"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:5455","reference_id":"RHSA-2023:5455","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-03T14:44:32Z/"}],"url":"https://access.redhat.com/errata/RHSA-2023:5455"},{"reference_url":"https://usn.ubuntu.com/6409-1/","reference_id":"USN-6409-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6409-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923418?format=json","purl":"pkg:deb/debian/glibc@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923491?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923492?format=json","purl":"pkg:deb/debian/glibc@2.37-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.37-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2023-4527"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w16u-mjyw-pben"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61773?format=json","vulnerability_id":"VCID-w1zk-1c5m-3fb2","summary":"Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4458.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4458.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4458","reference_id":"","reference_type":"","scores":[{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.78873","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.78879","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.78908","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.78889","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.78914","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.7892","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.78944","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.78929","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.78948","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.78945","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.78974","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.7898","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.78997","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01201","scoring_system":"epss","scoring_elements":"0.79013","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4458"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1022280","reference_id":"1022280","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1022280"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=727181","reference_id":"727181","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=727181"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1391","reference_id":"RHSA-2014:1391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1391"},{"reference_url":"https://usn.ubuntu.com/2306-1/","reference_id":"USN-2306-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2306-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923444?format=json","purl":"pkg:deb/debian/glibc@2.18-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.18-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2013-4458"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w1zk-1c5m-3fb2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56594?format=json","vulnerability_id":"VCID-w5hj-83tc-fufp","summary":"security update","references":[{"reference_url":"http://linux.oracle.com/errata/ELSA-2015-0092.html","reference_id":"","reference_type":"","scores":[],"url":"http://linux.oracle.com/errata/ELSA-2015-0092.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0475.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0475.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0475","reference_id":"","reference_type":"","scores":[{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69511","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69606","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69658","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69667","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69522","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69537","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69516","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69567","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69583","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69605","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69589","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69576","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69616","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00604","scoring_system":"epss","scoring_elements":"0.69625","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00889","scoring_system":"epss","scoring_elements":"0.75604","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00889","scoring_system":"epss","scoring_elements":"0.75594","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0475"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0475","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0475"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2014-1110.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2014-1110.html"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=17137","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=17137"},{"reference_url":"http://www.debian.org/security/2014/dsa-2976","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-2976"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:152","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:152"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/07/10/7","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/07/10/7"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/07/14/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/07/14/6"},{"reference_url":"http://www.securityfocus.com/bid/68505","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/68505"},{"reference_url":"http://www.securitytracker.com/id/1030569","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030569"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1102353","reference_id":"1102353","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1102353"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0475","reference_id":"CVE-2014-0475","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0475"},{"reference_url":"https://security.gentoo.org/glsa/201602-02","reference_id":"GLSA-201602-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1110","reference_id":"RHSA-2014:1110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1110"},{"reference_url":"https://usn.ubuntu.com/2306-1/","reference_id":"USN-2306-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2306-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923447?format=json","purl":"pkg:deb/debian/glibc@2.19-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2014-0475"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w5hj-83tc-fufp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48730?format=json","vulnerability_id":"VCID-w8rc-tnpk-83c4","summary":"Multiple vulnerabilities were found in glibc, the worst of which allowing\n    local attackers to execute arbitrary code as root.","references":[{"reference_url":"http://drosenbe.blogspot.com/2010/05/integer-overflow-in-ldso-cve-2010-0830.html","reference_id":"","reference_type":"","scores":[],"url":"http://drosenbe.blogspot.com/2010/05/integer-overflow-in-ldso-cve-2010-0830.html"},{"reference_url":"http://frugalware.org/security/662","reference_id":"","reference_type":"","scores":[],"url":"http://frugalware.org/security/662"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0830.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0830.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0830","reference_id":"","reference_type":"","scores":[{"value":"0.06292","scoring_system":"epss","scoring_elements":"0.90995","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06292","scoring_system":"epss","scoring_elements":"0.90897","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06292","scoring_system":"epss","scoring_elements":"0.90902","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06292","scoring_system":"epss","scoring_elements":"0.90912","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06292","scoring_system":"epss","scoring_elements":"0.90922","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06292","scoring_system":"epss","scoring_elements":"0.90933","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06292","scoring_system":"epss","scoring_elements":"0.90939","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06292","scoring_system":"epss","scoring_elements":"0.90948","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06292","scoring_system":"epss","scoring_elements":"0.90947","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06292","scoring_system":"epss","scoring_elements":"0.90972","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06292","scoring_system":"epss","scoring_elements":"0.9097","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06292","scoring_system":"epss","scoring_elements":"0.90983","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06292","scoring_system":"epss","scoring_elements":"0.90981","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06292","scoring_system":"epss","scoring_elements":"0.90978","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0830"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0830","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0830"},{"reference_url":"http://secunia.com/advisories/39900","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/39900"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201011-01.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201011-01.xml"},{"reference_url":"http://securitytracker.com/id?1024044","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1024044"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/58915","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/58915"},{"reference_url":"https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html"},{"reference_url":"http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=db07e962b6ea963dbb345439f6ab9b0cf74d87c5","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=db07e962b6ea963dbb345439f6ab9b0cf74d87c5"},{"reference_url":"http://www.debian.org/security/2010/dsa-2058","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2010/dsa-2058"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:111","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:111"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:112","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2010:112"},{"reference_url":"http://www.securityfocus.com/bid/40063","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/40063"},{"reference_url":"http://www.ubuntu.com/usn/USN-944-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-944-1"},{"reference_url":"http://www.vupen.com/english/advisories/2010/1246","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2010/1246"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=599056","reference_id":"599056","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=599056"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2010-0830","reference_id":"CVE-2010-0830","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2010-0830"},{"reference_url":"https://security.gentoo.org/glsa/201011-01","reference_id":"GLSA-201011-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201011-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0125","reference_id":"RHSA-2012:0125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0126","reference_id":"RHSA-2012:0126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0126"},{"reference_url":"https://usn.ubuntu.com/944-1/","reference_id":"USN-944-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/944-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923424?format=json","purl":"pkg:deb/debian/glibc@2.11-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.11-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2010-0830"],"risk_score":2.3,"exploitability":"0.5","weighted_severity":"4.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w8rc-tnpk-83c4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31486?format=json","vulnerability_id":"VCID-wctr-ebf2-gqa1","summary":"Multiple vulnerabilities have been found in glibc, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15670.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15670.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15670","reference_id":"","reference_type":"","scores":[{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44273","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44034","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4439","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4432","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44233","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44236","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44155","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44344","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44366","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44302","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44354","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44359","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44376","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44345","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.444","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-15670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:S/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22320","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22320"},{"reference_url":"http://www.securityfocus.com/bid/101521","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101521"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1504804","reference_id":"1504804","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1504804"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879501","reference_id":"879501","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=879501"},{"reference_url":"https://security.archlinux.org/ASA-201801-8","reference_id":"ASA-201801-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-8"},{"reference_url":"https://security.archlinux.org/ASA-201801-9","reference_id":"ASA-201801-9","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-9"},{"reference_url":"https://security.archlinux.org/AVG-460","reference_id":"AVG-460","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-460"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15670","reference_id":"CVE-2017-15670","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-15670"},{"reference_url":"https://security.gentoo.org/glsa/201804-02","reference_id":"GLSA-201804-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0805","reference_id":"RHSA-2018:0805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0805"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:1879","reference_id":"RHSA-2018:1879","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:1879"},{"reference_url":"https://usn.ubuntu.com/3534-1/","reference_id":"USN-3534-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3534-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923469?format=json","purl":"pkg:deb/debian/glibc@2.25-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.25-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2017-15670"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wctr-ebf2-gqa1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58068?format=json","vulnerability_id":"VCID-weg2-kxcj-fkcg","summary":"security update","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html"},{"reference_url":"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0680.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2017-0680.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8778.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8778.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8778","reference_id":"","reference_type":"","scores":[{"value":"0.05254","scoring_system":"epss","scoring_elements":"0.90026","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05254","scoring_system":"epss","scoring_elements":"0.90016","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05254","scoring_system":"epss","scoring_elements":"0.90015","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05254","scoring_system":"epss","scoring_elements":"0.90014","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06102","scoring_system":"epss","scoring_elements":"0.90802","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09807","scoring_system":"epss","scoring_elements":"0.92948","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09807","scoring_system":"epss","scoring_elements":"0.92956","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09807","scoring_system":"epss","scoring_elements":"0.9296","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09807","scoring_system":"epss","scoring_elements":"0.92965","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09807","scoring_system":"epss","scoring_elements":"0.92963","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09807","scoring_system":"epss","scoring_elements":"0.92964","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09807","scoring_system":"epss","scoring_elements":"0.92974","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09807","scoring_system":"epss","scoring_elements":"0.92936","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09807","scoring_system":"epss","scoring_elements":"0.92945","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09807","scoring_system":"epss","scoring_elements":"0.92949","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779"},{"reference_url":"http://seclists.org/fulldisclosure/2019/Sep/7","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2019/Sep/7"},{"reference_url":"https://seclists.org/bugtraq/2019/Sep/7","reference_id":"","reference_type":"","scores":[],"url":"https://seclists.org/bugtraq/2019/Sep/7"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=18240","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=18240"},{"reference_url":"https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html"},{"reference_url":"http://www.debian.org/security/2016/dsa-3480","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3480"},{"reference_url":"http://www.debian.org/security/2016/dsa-3481","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3481"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/19/11","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/19/11"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/01/20/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/01/20/1"},{"reference_url":"http://www.securityfocus.com/bid/83275","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/83275"},{"reference_url":"http://www.ubuntu.com/usn/USN-2985-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2985-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2985-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2985-2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300303","reference_id":"1300303","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1300303"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812441","reference_id":"812441","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=812441"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:suse:linux_enterprise_debuginfo:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:sp1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux_enterprise_server:12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8778","reference_id":"CVE-2015-8778","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8778"},{"reference_url":"https://security.gentoo.org/glsa/201602-02","reference_id":"GLSA-201602-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-02"},{"reference_url":"https://security.gentoo.org/glsa/201702-11","reference_id":"GLSA-201702-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201702-11"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0680","reference_id":"RHSA-2017:0680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1916","reference_id":"RHSA-2017:1916","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1916"},{"reference_url":"https://usn.ubuntu.com/2985-1/","reference_id":"USN-2985-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2985-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923456?format=json","purl":"pkg:deb/debian/glibc@2.21-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.21-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2015-8778"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-weg2-kxcj-fkcg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89894?format=json","vulnerability_id":"VCID-wj8t-9j8k-wuap","summary":"security flaw","references":[{"reference_url":"ftp://ftp.caldera.com/pub/updates/OpenServer/CSSA-2002-SCO.39","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.caldera.com/pub/updates/OpenServer/CSSA-2002-SCO.39"},{"reference_url":"ftp://ftp.caldera.com/pub/updates/UnixWare/CSSA-2002-SCO.37","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.caldera.com/pub/updates/UnixWare/CSSA-2002-SCO.37"},{"reference_url":"ftp://ftp.NetBSD.ORG/pub/NetBSD/security/advisories/NetBSD-SA2002-006.txt.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.NetBSD.ORG/pub/NetBSD/security/advisories/NetBSD-SA2002-006.txt.asc"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20020701-01-I/","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20020701-01-I/"},{"reference_url":"http://archives.neohapsis.com/archives/aix/2002-q3/0001.html","reference_id":"","reference_type":"","scores":[],"url":"http://archives.neohapsis.com/archives/aix/2002-q3/0001.html"},{"reference_url":"http://archives.neohapsis.com/archives/linux/engarde/2002-q3/0002.html","reference_id":"","reference_type":"","scores":[],"url":"http://archives.neohapsis.com/archives/linux/engarde/2002-q3/0002.html"},{"reference_url":"http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0000.html","reference_id":"","reference_type":"","scores":[],"url":"http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0000.html"},{"reference_url":"http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000507","reference_id":"","reference_type":"","scores":[],"url":"http://distro.conectiva.com/atualizacoes/?id=a&anuncio=000507"},{"reference_url":"http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:038","reference_id":"","reference_type":"","scores":[],"url":"http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:038"},{"reference_url":"http://marc.info/?l=bugtraq&m=102513011311504&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=102513011311504&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=102520962320134&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=102520962320134&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=102579743329251&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=102579743329251&w=2"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2002-139.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2002-139.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0651.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0651.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2002-0651","reference_id":"","reference_type":"","scores":[{"value":"0.07259","scoring_system":"epss","scoring_elements":"0.91665","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07259","scoring_system":"epss","scoring_elements":"0.91594","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07259","scoring_system":"epss","scoring_elements":"0.91602","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07259","scoring_system":"epss","scoring_elements":"0.91608","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07259","scoring_system":"epss","scoring_elements":"0.91616","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07259","scoring_system":"epss","scoring_elements":"0.91629","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07259","scoring_system":"epss","scoring_elements":"0.91635","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07259","scoring_system":"epss","scoring_elements":"0.91638","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07259","scoring_system":"epss","scoring_elements":"0.91641","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07259","scoring_system":"epss","scoring_elements":"0.91637","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07259","scoring_system":"epss","scoring_elements":"0.91658","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07259","scoring_system":"epss","scoring_elements":"0.91651","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07259","scoring_system":"epss","scoring_elements":"0.9165","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07259","scoring_system":"epss","scoring_elements":"0.91657","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07259","scoring_system":"epss","scoring_elements":"0.91655","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07259","scoring_system":"epss","scoring_elements":"0.91652","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2002-0651"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0651","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0651"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4190","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4190"},{"reference_url":"http://www.cert.org/advisories/CA-2002-19.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.cert.org/advisories/CA-2002-19.html"},{"reference_url":"http://www.iss.net/security_center/static/9432.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.iss.net/security_center/static/9432.php"},{"reference_url":"http://www.kb.cert.org/vuls/id/803539","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/803539"},{"reference_url":"http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-043.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-043.php"},{"reference_url":"http://www.pine.nl/advisories/pine-cert-20020601.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.pine.nl/advisories/pine-cert-20020601.txt"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2002-119.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2002-119.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2002-133.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2002-133.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2002-167.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2002-167.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2003-154.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2003-154.html"},{"reference_url":"http://www.securityfocus.com/bid/5100","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/5100"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616785","reference_id":"1616785","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616785"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2002-0651","reference_id":"CVE-2002-0651","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2002-0651"},{"reference_url":"https://access.redhat.com/errata/RHSA-2002:119","reference_id":"RHSA-2002:119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2002:119"},{"reference_url":"https://access.redhat.com/errata/RHSA-2002:133","reference_id":"RHSA-2002:133","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2002:133"},{"reference_url":"https://access.redhat.com/errata/RHSA-2002:139","reference_id":"RHSA-2002:139","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2002:139"},{"reference_url":"https://access.redhat.com/errata/RHSA-2002:167","reference_id":"RHSA-2002:167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2002:167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:154","reference_id":"RHSA-2003:154","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:154"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923412?format=json","purl":"pkg:deb/debian/glibc@2.2.5-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.2.5-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2002-0651"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wj8t-9j8k-wuap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31489?format=json","vulnerability_id":"VCID-wp12-z5a5-pbgd","summary":"Multiple vulnerabilities have been found in glibc, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/errata/RHBA-2019:0327","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHBA-2019:0327"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16997.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16997.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-16997","reference_id":"","reference_type":"","scores":[{"value":"0.00878","scoring_system":"epss","scoring_elements":"0.75266","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00878","scoring_system":"epss","scoring_elements":"0.75334","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00878","scoring_system":"epss","scoring_elements":"0.75368","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00878","scoring_system":"epss","scoring_elements":"0.75358","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00878","scoring_system":"epss","scoring_elements":"0.75392","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00878","scoring_system":"epss","scoring_elements":"0.75397","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00878","scoring_system":"epss","scoring_elements":"0.75402","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00878","scoring_system":"epss","scoring_elements":"0.7527","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00878","scoring_system":"epss","scoring_elements":"0.75302","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00878","scoring_system":"epss","scoring_elements":"0.7528","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00878","scoring_system":"epss","scoring_elements":"0.75323","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00878","scoring_system":"epss","scoring_elements":"0.75355","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00878","scoring_system":"epss","scoring_elements":"0.75333","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00878","scoring_system":"epss","scoring_elements":"0.75322","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00878","scoring_system":"epss","scoring_elements":"0.75362","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01133","scoring_system":"epss","scoring_elements":"0.78438","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-16997"},{"reference_url":"https://bugs.debian.org/884615","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.debian.org/884615"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16997","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16997"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22625","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22625"},{"reference_url":"https://sourceware.org/ml/libc-alpha/2017-12/msg00528.html","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/ml/libc-alpha/2017-12/msg00528.html"},{"reference_url":"http://www.securityfocus.com/bid/102228","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/102228"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1526865","reference_id":"1526865","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1526865"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884615","reference_id":"884615","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=884615"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.25:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.25:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.25:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-16997","reference_id":"CVE-2017-16997","reference_type":"","scores":[{"value":"9.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-16997"},{"reference_url":"https://security.gentoo.org/glsa/201804-02","reference_id":"GLSA-201804-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:3092","reference_id":"RHSA-2018:3092","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:3092"},{"reference_url":"https://usn.ubuntu.com/3534-1/","reference_id":"USN-3534-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3534-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923470?format=json","purl":"pkg:deb/debian/glibc@2.25-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.25-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2017-16997"],"risk_score":4.2,"exploitability":"0.5","weighted_severity":"8.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wp12-z5a5-pbgd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62169?format=json","vulnerability_id":"VCID-wp18-zqr6-a3ag","summary":"Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23219.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23219.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23219","reference_id":"","reference_type":"","scores":[{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59398","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59469","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.5946","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59476","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59439","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59453","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00379","scoring_system":"epss","scoring_elements":"0.59433","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65815","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00496","scoring_system":"epss","scoring_elements":"0.65785","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66885","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66886","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66912","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66934","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66947","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00523","scoring_system":"epss","scoring_elements":"0.66967","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-23219"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23219"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2042017","reference_id":"2042017","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2042017"},{"reference_url":"https://security.gentoo.org/glsa/202208-24","reference_id":"GLSA-202208-24","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:40Z/"}],"url":"https://security.gentoo.org/glsa/202208-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0896","reference_id":"RHSA-2022:0896","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0896"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22542","reference_id":"show_bug.cgi?id=22542","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-04-23T13:31:40Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22542"},{"reference_url":"https://usn.ubuntu.com/5310-1/","reference_id":"USN-5310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-1/"},{"reference_url":"https://usn.ubuntu.com/5310-2/","reference_id":"USN-5310-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923485?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923490?format=json","purl":"pkg:deb/debian/glibc@2.33-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.33-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2022-23219"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wp18-zqr6-a3ag"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31490?format=json","vulnerability_id":"VCID-ww2m-6691-yfa7","summary":"Multiple vulnerabilities have been found in glibc, the worst of\n    which could allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000001.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000001.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1000001","reference_id":"","reference_type":"","scores":[{"value":"0.41417","scoring_system":"epss","scoring_elements":"0.97422","published_at":"2026-05-05T12:55:00Z"},{"value":"0.41417","scoring_system":"epss","scoring_elements":"0.97412","published_at":"2026-04-24T12:55:00Z"},{"value":"0.41417","scoring_system":"epss","scoring_elements":"0.97411","published_at":"2026-04-21T12:55:00Z"},{"value":"0.41417","scoring_system":"epss","scoring_elements":"0.97414","published_at":"2026-04-26T12:55:00Z"},{"value":"0.41417","scoring_system":"epss","scoring_elements":"0.97417","published_at":"2026-04-29T12:55:00Z"},{"value":"0.41417","scoring_system":"epss","scoring_elements":"0.9739","published_at":"2026-04-07T12:55:00Z"},{"value":"0.41417","scoring_system":"epss","scoring_elements":"0.97396","published_at":"2026-04-08T12:55:00Z"},{"value":"0.41417","scoring_system":"epss","scoring_elements":"0.97397","published_at":"2026-04-09T12:55:00Z"},{"value":"0.41417","scoring_system":"epss","scoring_elements":"0.97399","published_at":"2026-04-11T12:55:00Z"},{"value":"0.41417","scoring_system":"epss","scoring_elements":"0.974","published_at":"2026-04-12T12:55:00Z"},{"value":"0.41417","scoring_system":"epss","scoring_elements":"0.97401","published_at":"2026-04-13T12:55:00Z"},{"value":"0.41417","scoring_system":"epss","scoring_elements":"0.97409","published_at":"2026-04-16T12:55:00Z"},{"value":"0.44049","scoring_system":"epss","scoring_elements":"0.97524","published_at":"2026-04-02T12:55:00Z"},{"value":"0.44049","scoring_system":"epss","scoring_elements":"0.97527","published_at":"2026-04-04T12:55:00Z"},{"value":"0.44049","scoring_system":"epss","scoring_elements":"0.97518","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1000001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1533836","reference_id":"1533836","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1533836"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887001","reference_id":"887001","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=887001"},{"reference_url":"https://security.archlinux.org/ASA-201801-18","reference_id":"ASA-201801-18","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-18"},{"reference_url":"https://security.archlinux.org/ASA-201801-19","reference_id":"ASA-201801-19","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201801-19"},{"reference_url":"https://security.archlinux.org/AVG-590","reference_id":"AVG-590","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-590"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43775.c","reference_id":"CVE-2018-1000001","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/43775.c"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44889.rb","reference_id":"CVE-2018-1000001","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/44889.rb"},{"reference_url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/29f4870fa0f916e31300d1bc78aeabeb297c667f/modules/exploits/linux/local/glibc_realpath_priv_esc.rb","reference_id":"CVE-2018-1000001","reference_type":"exploit","scores":[],"url":"https://raw.githubusercontent.com/rapid7/metasploit-framework/29f4870fa0f916e31300d1bc78aeabeb297c667f/modules/exploits/linux/local/glibc_realpath_priv_esc.rb"},{"reference_url":"https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/RationalLove.c","reference_id":"CVE-2018-1000001","reference_type":"exploit","scores":[],"url":"https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/RationalLove.c"},{"reference_url":"https://security.gentoo.org/glsa/201804-02","reference_id":"GLSA-201804-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201804-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0805","reference_id":"RHSA-2018:0805","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0805"},{"reference_url":"https://usn.ubuntu.com/3534-1/","reference_id":"USN-3534-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3534-1/"},{"reference_url":"https://usn.ubuntu.com/3536-1/","reference_id":"USN-3536-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3536-1/"},{"reference_url":"https://usn.ubuntu.com/USN-4768-1/","reference_id":"USN-USN-4768-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/USN-4768-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923472?format=json","purl":"pkg:deb/debian/glibc@2.26-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.26-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2018-1000001"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ww2m-6691-yfa7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43043?format=json","vulnerability_id":"VCID-xhcm-t8jb-ybfb","summary":"Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33602.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33602.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33602","reference_id":"","reference_type":"","scores":[{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63592","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63607","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63633","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63644","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63661","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63676","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.6366","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63627","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63664","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63673","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0061","scoring_system":"epss","scoring_elements":"0.69827","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.70316","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.70319","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.70258","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.70311","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277206","reference_id":"2277206","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277206"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/07/22/5","reference_id":"5","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/07/22/5"},{"reference_url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0008","reference_id":"GLIBC-SA-2024-0008","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/"}],"url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0008"},{"reference_url":"https://security.gentoo.org/glsa/202405-17","reference_id":"GLSA-202405-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-17"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html","reference_id":"msg00026.html","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240524-0012/","reference_id":"ntap-20240524-0012","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240524-0012/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2799","reference_id":"RHSA-2024:2799","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2799"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3309","reference_id":"RHSA-2024:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3312","reference_id":"RHSA-2024:3312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3339","reference_id":"RHSA-2024:3339","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3339"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3344","reference_id":"RHSA-2024:3344","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3411","reference_id":"RHSA-2024:3411","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3411"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3423","reference_id":"RHSA-2024:3423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3464","reference_id":"RHSA-2024:3464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3588","reference_id":"RHSA-2024:3588","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4126","reference_id":"RHSA-2024:4126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4126"},{"reference_url":"https://usn.ubuntu.com/6804-1/","reference_id":"USN-6804-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6804-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923504?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923503?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u7?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u7%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923505?format=json","purl":"pkg:deb/debian/glibc@2.37-19?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.37-19%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2024-33602"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xhcm-t8jb-ybfb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85805?format=json","vulnerability_id":"VCID-xyvn-w5ac-yqcn","summary":"glibc: multiple overflows in strxfrm()","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8982.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8982.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8982","reference_id":"","reference_type":"","scores":[{"value":"0.0131","scoring_system":"epss","scoring_elements":"0.79893","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0131","scoring_system":"epss","scoring_elements":"0.79863","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0131","scoring_system":"epss","scoring_elements":"0.79879","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0131","scoring_system":"epss","scoring_elements":"0.79746","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0131","scoring_system":"epss","scoring_elements":"0.79754","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0131","scoring_system":"epss","scoring_elements":"0.79775","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0131","scoring_system":"epss","scoring_elements":"0.79761","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0131","scoring_system":"epss","scoring_elements":"0.7979","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0131","scoring_system":"epss","scoring_elements":"0.79797","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0131","scoring_system":"epss","scoring_elements":"0.79819","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0131","scoring_system":"epss","scoring_elements":"0.79803","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0131","scoring_system":"epss","scoring_elements":"0.79795","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0131","scoring_system":"epss","scoring_elements":"0.79823","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0131","scoring_system":"epss","scoring_elements":"0.79824","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0131","scoring_system":"epss","scoring_elements":"0.79827","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0131","scoring_system":"epss","scoring_elements":"0.79856","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8982"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8982"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=16009","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=16009"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=0f9e585480ed","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=0f9e585480ed"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/02/13/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/02/13/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2017/02/14/9","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2017/02/14/9"},{"reference_url":"http://www.securityfocus.com/bid/72602","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/72602"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1192525","reference_id":"1192525","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1192525"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=803927","reference_id":"803927","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=803927"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8982","reference_id":"CVE-2015-8982","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8982"},{"reference_url":"https://usn.ubuntu.com/3239-1/","reference_id":"USN-3239-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3239-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923442?format=json","purl":"pkg:deb/debian/glibc@2.21-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.21-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2015-8982"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xyvn-w5ac-yqcn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57214?format=json","vulnerability_id":"VCID-y19v-br6n-3ybf","summary":"Multiple vulnerabilities have been found in GNU C Library, the\n    worst of which allowing arbitrary code execution and privilege escalation.","references":[{"reference_url":"http://bugs.gentoo.org/show_bug.cgi?id=330923","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.gentoo.org/show_bug.cgi?id=330923"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/08/21","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/08/21"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/08/22","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/08/22"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/08/8","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/08/8"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1095.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1095.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1095","reference_id":"","reference_type":"","scores":[{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24682","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25018","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25095","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25133","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24908","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24976","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25021","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.25035","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24995","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24941","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24954","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24946","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.2492","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24863","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24851","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24807","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1095"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1095","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1095"},{"reference_url":"http://secunia.com/advisories/43830","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43830"},{"reference_url":"http://secunia.com/advisories/43976","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43976"},{"reference_url":"http://secunia.com/advisories/43989","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43989"},{"reference_url":"http://secunia.com/advisories/46397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/46397"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201011-01.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201011-01.xml"},{"reference_url":"http://securitytracker.com/id?1025286","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1025286"},{"reference_url":"http://sources.redhat.com/bugzilla/show_bug.cgi?id=11904","reference_id":"","reference_type":"","scores":[],"url":"http://sources.redhat.com/bugzilla/show_bug.cgi?id=11904"},{"reference_url":"http://sourceware.org/bugzilla/show_bug.cgi?id=11904","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/bugzilla/show_bug.cgi?id=11904"},{"reference_url":"http://sourceware.org/git/?p=glibc.git%3Ba=patch%3Bh=026373745eab50a683536d950cb7e17dc98c4259","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/git/?p=glibc.git%3Ba=patch%3Bh=026373745eab50a683536d950cb7e17dc98c4259"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12272","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12272"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:178","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:178"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0412.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0412.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0413.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-0413.html"},{"reference_url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0863","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0863"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=625893","reference_id":"625893","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=625893"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1095","reference_id":"CVE-2011-1095","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1095"},{"reference_url":"https://security.gentoo.org/glsa/201312-01","reference_id":"GLSA-201312-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0412","reference_id":"RHSA-2011:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0413","reference_id":"RHSA-2011:0413","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0413"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0125","reference_id":"RHSA-2012:0125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0125"},{"reference_url":"https://usn.ubuntu.com/1396-1/","reference_id":"USN-1396-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1396-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923434?format=json","purl":"pkg:deb/debian/glibc@2.13-16?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.13-16%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2011-1095"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y19v-br6n-3ybf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61772?format=json","vulnerability_id":"VCID-ydrg-f673-53gv","summary":"Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4332.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4332.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4332","reference_id":"","reference_type":"","scores":[{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.81904","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.81915","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.81938","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.81934","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.81961","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.81968","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.81988","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.81976","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.81971","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.82007","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.82009","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.82031","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.82043","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.82047","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01645","scoring_system":"epss","scoring_elements":"0.82065","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1007545","reference_id":"1007545","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1007545"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722536","reference_id":"722536","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722536"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1411","reference_id":"RHSA-2013:1411","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1411"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1605","reference_id":"RHSA-2013:1605","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1605"},{"reference_url":"https://usn.ubuntu.com/1991-1/","reference_id":"USN-1991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1991-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923443?format=json","purl":"pkg:deb/debian/glibc@2.17-93?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.17-93%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2013-4332"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ydrg-f673-53gv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61771?format=json","vulnerability_id":"VCID-yh8v-ebxn-z7dp","summary":"Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4237.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4237.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4237","reference_id":"","reference_type":"","scores":[{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77497","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77503","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77528","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77508","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77538","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77547","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77573","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77558","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77556","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77594","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77592","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77586","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77619","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77626","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77641","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01052","scoring_system":"epss","scoring_elements":"0.77651","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4237"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=719558","reference_id":"719558","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=719558"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=995839","reference_id":"995839","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=995839"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1391","reference_id":"RHSA-2014:1391","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1391"},{"reference_url":"https://usn.ubuntu.com/1991-1/","reference_id":"USN-1991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1991-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923439?format=json","purl":"pkg:deb/debian/glibc@2.17-94?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.17-94%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2013-4237"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yh8v-ebxn-z7dp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61864?format=json","vulnerability_id":"VCID-ys5d-7xgp-w7g5","summary":"A vulnerability has been discovered in glibc, which can lead to execution of arbitrary code..","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0395.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-0395.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0395","reference_id":"","reference_type":"","scores":[{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21846","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21423","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21899","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21664","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.2174","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21798","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21808","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21768","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21711","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21718","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00071","scoring_system":"epss","scoring_elements":"0.21685","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21955","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21942","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21929","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-0395"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0395","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0395"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://sourceware.org/pipermail/libc-announce/2025/000044.html","reference_id":"000044.html","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/"}],"url":"https://sourceware.org/pipermail/libc-announce/2025/000044.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339460","reference_id":"2339460","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2339460"},{"reference_url":"https://www.openwall.com/lists/oss-security/2025/01/22/4","reference_id":"4","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/"}],"url":"https://www.openwall.com/lists/oss-security/2025/01/22/4"},{"reference_url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2025-0001","reference_id":"GLIBC-SA-2025-0001","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/"}],"url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2025-0001"},{"reference_url":"https://security.gentoo.org/glsa/202505-06","reference_id":"GLSA-202505-06","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202505-06"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3828","reference_id":"RHSA-2025:3828","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3828"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4241","reference_id":"RHSA-2025:4241","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4241"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4242","reference_id":"RHSA-2025:4242","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4242"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4243","reference_id":"RHSA-2025:4243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4244","reference_id":"RHSA-2025:4244","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4244"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32582","reference_id":"show_bug.cgi?id=32582","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T20:45:32Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=32582"},{"reference_url":"https://usn.ubuntu.com/7259-1/","reference_id":"USN-7259-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7259-1/"},{"reference_url":"https://usn.ubuntu.com/7259-2/","reference_id":"USN-7259-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7259-2/"},{"reference_url":"https://usn.ubuntu.com/7259-3/","reference_id":"USN-7259-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7259-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923507?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u12?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u12%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923506?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923508?format=json","purl":"pkg:deb/debian/glibc@2.40-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.40-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2025-0395"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ys5d-7xgp-w7g5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/54414?format=json","vulnerability_id":"VCID-ywmm-hzmg-z3b4","summary":"security update","references":[{"reference_url":"http://linux.oracle.com/errata/ELSA-2015-0016.html","reference_id":"","reference_type":"","scores":[],"url":"http://linux.oracle.com/errata/ELSA-2015-0016.html"},{"reference_url":"http://linux.oracle.com/errata/ELSA-2015-0092.html","reference_id":"","reference_type":"","scores":[],"url":"http://linux.oracle.com/errata/ELSA-2015-0092.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-02/msg00089.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-02/msg00089.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-2023.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2014-2023.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7817.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7817.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-7817","reference_id":"","reference_type":"","scores":[{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36109","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36536","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36708","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36739","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36577","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.3663","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36647","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36655","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36621","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36596","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36642","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36625","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36566","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36342","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36312","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36226","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-7817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235"},{"reference_url":"http://seclists.org/oss-sec/2014/q4/730","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/oss-sec/2014/q4/730"},{"reference_url":"http://secunia.com/advisories/62100","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62100"},{"reference_url":"http://secunia.com/advisories/62146","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/62146"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/98852","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/98852"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=17625","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=17625"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=a39208bd7fb76c1b01c127b4c61f9bfd915bfe7c","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=a39208bd7fb76c1b01c127b4c61f9bfd915bfe7c"},{"reference_url":"https://sourceware.org/ml/libc-alpha/2014-11/msg00519.html","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/ml/libc-alpha/2014-11/msg00519.html"},{"reference_url":"http://www.debian.org/security/2015/dsa-3142","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3142"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"reference_url":"http://www.securityfocus.com/bid/71216","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/71216"},{"reference_url":"http://www.ubuntu.com/usn/USN-2432-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2432-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1157689","reference_id":"1157689","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1157689"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775572","reference_id":"775572","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775572"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-7817","reference_id":"CVE-2014-7817","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-7817"},{"reference_url":"https://security.gentoo.org/glsa/201602-02","reference_id":"GLSA-201602-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201602-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:2023","reference_id":"RHSA-2014:2023","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:2023"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0016","reference_id":"RHSA-2015:0016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0016"},{"reference_url":"https://usn.ubuntu.com/2432-1/","reference_id":"USN-2432-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2432-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923437?format=json","purl":"pkg:deb/debian/glibc@2.19-14?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.19-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2014-7817"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ywmm-hzmg-z3b4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/84958?format=json","vulnerability_id":"VCID-z2xd-8n4a-b3cp","summary":"glibc: per-thread memory leak in __res_vinit with IPv6 nameservers","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5417.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5417.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5417","reference_id":"","reference_type":"","scores":[{"value":"0.01185","scoring_system":"epss","scoring_elements":"0.78734","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01185","scoring_system":"epss","scoring_elements":"0.78741","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01185","scoring_system":"epss","scoring_elements":"0.78772","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01185","scoring_system":"epss","scoring_elements":"0.78755","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01185","scoring_system":"epss","scoring_elements":"0.7878","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01185","scoring_system":"epss","scoring_elements":"0.78787","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01185","scoring_system":"epss","scoring_elements":"0.78811","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01185","scoring_system":"epss","scoring_elements":"0.78794","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01185","scoring_system":"epss","scoring_elements":"0.78785","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01185","scoring_system":"epss","scoring_elements":"0.78813","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01185","scoring_system":"epss","scoring_elements":"0.7881","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01185","scoring_system":"epss","scoring_elements":"0.78808","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01185","scoring_system":"epss","scoring_elements":"0.78836","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01185","scoring_system":"epss","scoring_elements":"0.78842","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01185","scoring_system":"epss","scoring_elements":"0.78859","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01185","scoring_system":"epss","scoring_elements":"0.78877","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5417","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5417"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1362534","reference_id":"1362534","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1362534"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=833302","reference_id":"833302","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=833302"},{"reference_url":"https://usn.ubuntu.com/3239-1/","reference_id":"USN-3239-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3239-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923463?format=json","purl":"pkg:deb/debian/glibc@2.22-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.22-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2016-5417"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z2xd-8n4a-b3cp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83856?format=json","vulnerability_id":"VCID-z55w-t8kd-hqep","summary":"glibc: Integer overflow with enabled tcache","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17426.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-17426.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-17426","reference_id":"","reference_type":"","scores":[{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.57899","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.57937","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.57996","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.57979","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.57983","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58002","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.57978","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58033","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58035","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58052","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58031","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.5801","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.5804","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58039","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.58016","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00358","scoring_system":"epss","scoring_elements":"0.5798","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-17426"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22375","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=22375"},{"reference_url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=34697694e8a93b325b18f25f7dcded55d6baeaf6","reference_id":"","reference_type":"","scores":[],"url":"https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=34697694e8a93b325b18f25f7dcded55d6baeaf6"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1524530","reference_id":"1524530","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1524530"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-17426","reference_id":"CVE-2017-17426","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-17426"},{"reference_url":"https://usn.ubuntu.com/3534-1/","reference_id":"USN-3534-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3534-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923418?format=json","purl":"pkg:deb/debian/glibc@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2017-17426"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z55w-t8kd-hqep"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61768?format=json","vulnerability_id":"VCID-za5g-uj5p-5kd4","summary":"Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .","references":[{"reference_url":"http://osvdb.org/89747","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/89747"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0769.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0769.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1605.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-1605.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0242.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0242.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-0242","reference_id":"","reference_type":"","scores":[{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84196","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84044","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84057","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84073","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84098","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84105","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84122","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84116","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84112","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84134","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84136","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.8414","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84164","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.8417","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84175","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-0242"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242"},{"reference_url":"http://secunia.com/advisories/51951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51951"},{"reference_url":"http://secunia.com/advisories/55113","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/55113"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/81707","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/81707"},{"reference_url":"http://sourceware.org/bugzilla/show_bug.cgi?id=15078","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/bugzilla/show_bug.cgi?id=15078"},{"reference_url":"http://sourceware.org/ml/libc-alpha/2013-01/msg00967.html","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/ml/libc-alpha/2013-01/msg00967.html"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:163","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:163"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/01/30/5","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/01/30/5"},{"reference_url":"http://www.securityfocus.com/bid/57638","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/57638"},{"reference_url":"http://www.securitytracker.com/id/1028063","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1028063"},{"reference_url":"http://www.ubuntu.com/usn/USN-1991-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1991-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2014-0008.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2014-0008.html"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699399","reference_id":"699399","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699399"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=905874","reference_id":"905874","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=905874"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-0242","reference_id":"CVE-2013-0242","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-0242"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0769","reference_id":"RHSA-2013:0769","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0769"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1605","reference_id":"RHSA-2013:1605","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1605"},{"reference_url":"https://usn.ubuntu.com/1991-1/","reference_id":"USN-1991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1991-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923441?format=json","purl":"pkg:deb/debian/glibc@2.17-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.17-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2013-0242"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-za5g-uj5p-5kd4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57216?format=json","vulnerability_id":"VCID-zhzd-f8a6-juaa","summary":"Multiple vulnerabilities have been found in GNU C Library, the\n    worst of which allowing arbitrary code execution and privilege escalation.","references":[{"reference_url":"http://code.google.com/p/chromium/issues/detail?id=48733","reference_id":"","reference_type":"","scores":[],"url":"http://code.google.com/p/chromium/issues/detail?id=48733"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1659.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1659.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1659","reference_id":"","reference_type":"","scores":[{"value":"0.02476","scoring_system":"epss","scoring_elements":"0.85345","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02476","scoring_system":"epss","scoring_elements":"0.85211","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02476","scoring_system":"epss","scoring_elements":"0.85222","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02476","scoring_system":"epss","scoring_elements":"0.85241","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02476","scoring_system":"epss","scoring_elements":"0.85243","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02476","scoring_system":"epss","scoring_elements":"0.85265","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02476","scoring_system":"epss","scoring_elements":"0.85273","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02476","scoring_system":"epss","scoring_elements":"0.85287","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02476","scoring_system":"epss","scoring_elements":"0.85285","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02476","scoring_system":"epss","scoring_elements":"0.85282","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02476","scoring_system":"epss","scoring_elements":"0.85303","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02476","scoring_system":"epss","scoring_elements":"0.85304","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02476","scoring_system":"epss","scoring_elements":"0.853","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02476","scoring_system":"epss","scoring_elements":"0.85323","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02476","scoring_system":"epss","scoring_elements":"0.85332","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02476","scoring_system":"epss","scoring_elements":"0.85331","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1659"},{"reference_url":"http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html","reference_id":"","reference_type":"","scores":[],"url":"http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1659","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1659"},{"reference_url":"http://secunia.com/advisories/44353","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/44353"},{"reference_url":"http://secunia.com/advisories/46397","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/46397"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66819","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66819"},{"reference_url":"http://sourceware.org/bugzilla/show_bug.cgi?id=12583","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/bugzilla/show_bug.cgi?id=12583"},{"reference_url":"http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=8126d90480fa3e0c5c5cd0d02cb1c93174b45485","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=8126d90480fa3e0c5c5cd0d02cb1c93174b45485"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:178","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:178"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:179","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:179"},{"reference_url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/520102/100/0/threaded"},{"reference_url":"http://www.securitytracker.com/id?1025450","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1025450"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2011-0012.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=681054","reference_id":"681054","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=681054"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.00:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.01:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.02:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.03:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.05:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.06:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.07:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.08:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:1.09.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1659","reference_id":"CVE-2011-1659","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1659"},{"reference_url":"https://security.gentoo.org/glsa/201312-01","reference_id":"GLSA-201312-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0412","reference_id":"RHSA-2011:0412","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0412"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0413","reference_id":"RHSA-2011:0413","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0413"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0125","reference_id":"RHSA-2012:0125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0125"},{"reference_url":"https://usn.ubuntu.com/1396-1/","reference_id":"USN-1396-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1396-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923433?format=json","purl":"pkg:deb/debian/glibc@2.13-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.13-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2011-1659"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zhzd-f8a6-juaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78322?format=json","vulnerability_id":"VCID-zk4w-q3pr-myh6","summary":"glibc: buffer overflow (read past end of buffer) in internal_fnmatch=>end_pattern with \"**(!()\" pattern","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-20109.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-20109.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-20109","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08329","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08384","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08439","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08359","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08429","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08446","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08419","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08404","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08296","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0828","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08436","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08926","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.09042","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.09014","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.09051","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.09095","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-20109"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20109","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20109"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2217330","reference_id":"2217330","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2217330"},{"reference_url":"https://security.netapp.com/advisory/ntap-20230731-0009/","reference_id":"ntap-20230731-0009","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T19:50:07Z/"}],"url":"https://security.netapp.com/advisory/ntap-20230731-0009/"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=18036","reference_id":"show_bug.cgi?id=18036","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T19:50:07Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=18036"},{"reference_url":"https://usn.ubuntu.com/6762-1/","reference_id":"USN-6762-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6762-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923454?format=json","purl":"pkg:deb/debian/glibc@2.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.22-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2015-20109"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zk4w-q3pr-myh6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43778?format=json","vulnerability_id":"VCID-zqx5-4rdk-1qa3","summary":"Multiple vulnerabilities in glibc could result in Denial of\n    Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27645.json","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27645.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-27645","reference_id":"","reference_type":"","scores":[{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11077","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10952","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11096","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11176","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11232","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11242","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11209","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11184","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11048","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11057","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11189","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11124","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11079","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11015","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.1122","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11283","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-27645"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27645"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1932589","reference_id":"1932589","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1932589"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/","reference_id":"7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7LZNT6KTMCCWPWXEOGSHD3YLYZKUGMH5/"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983479","reference_id":"983479","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983479"},{"reference_url":"https://security.archlinux.org/AVG-1621","reference_id":"AVG-1621","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1621"},{"reference_url":"https://security.gentoo.org/glsa/202107-07","reference_id":"GLSA-202107-07","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/"}],"url":"https://security.gentoo.org/glsa/202107-07"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/","reference_id":"I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I7TS26LIZSOBLGJEZMJX4PXT5BQDE2WS/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:4358","reference_id":"RHSA-2021:4358","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:4358"},{"reference_url":"https://sourceware.org/bugzilla/show_bug.cgi?id=27462","reference_id":"show_bug.cgi?id=27462","reference_type":"","scores":[{"value":"2.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T14:57:29Z/"}],"url":"https://sourceware.org/bugzilla/show_bug.cgi?id=27462"},{"reference_url":"https://usn.ubuntu.com/5310-1/","reference_id":"USN-5310-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5310-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923483?format=json","purl":"pkg:deb/debian/glibc@2.31-10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2021-27645"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zqx5-4rdk-1qa3"}],"risk_score":"3.6","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"}