{"url":"http://public2.vulnerablecode.io/api/packages/923441?format=json","purl":"pkg:deb/debian/glibc@2.17-2?distro=trixie","type":"deb","namespace":"debian","name":"glibc","version":"2.17-2","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.17-93","latest_non_vulnerable_version":"2.42-15","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61769?format=json","vulnerability_id":"VCID-tdxd-r347-3yex","summary":"Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .","references":[{"reference_url":"http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html","reference_id":"","reference_type":"","scores":[],"url":"http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0769.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0769.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1605.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-1605.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1914.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1914.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1914","reference_id":"","reference_type":"","scores":[{"value":"0.03104","scoring_system":"epss","scoring_elements":"0.86853","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03104","scoring_system":"epss","scoring_elements":"0.86827","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03104","scoring_system":"epss","scoring_elements":"0.86831","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03104","scoring_system":"epss","scoring_elements":"0.8683","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03104","scoring_system":"epss","scoring_elements":"0.86847","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03398","scoring_system":"epss","scoring_elements":"0.87422","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03398","scoring_system":"epss","scoring_elements":"0.87359","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03398","scoring_system":"epss","scoring_elements":"0.87413","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03398","scoring_system":"epss","scoring_elements":"0.87417","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03398","scoring_system":"epss","scoring_elements":"0.87369","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03398","scoring_system":"epss","scoring_elements":"0.87384","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03398","scoring_system":"epss","scoring_elements":"0.87403","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03398","scoring_system":"epss","scoring_elements":"0.8741","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1914"},{"reference_url":"https://bugzilla.novell.com/show_bug.cgi?id=813121","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.novell.com/show_bug.cgi?id=813121"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914"},{"reference_url":"http://seclists.org/fulldisclosure/2021/Sep/0","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2021/Sep/0"},{"reference_url":"http://secunia.com/advisories/52817","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/52817"},{"reference_url":"http://secunia.com/advisories/55113","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/55113"},{"reference_url":"http://sourceware.org/bugzilla/show_bug.cgi?id=15330","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/bugzilla/show_bug.cgi?id=15330"},{"reference_url":"http://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=1cef1b19089528db11f221e938f60b9b048945d7","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/git/?p=glibc.git%3Ba=commitdiff%3Bh=1cef1b19089528db11f221e938f60b9b048945d7"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:163","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:163"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:283","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:283"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:284","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:284"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/04/03/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/04/03/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/04/03/8","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/04/03/8"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/04/05/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/04/05/1"},{"reference_url":"http://www.securityfocus.com/bid/58839","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/58839"},{"reference_url":"http://www.ubuntu.com/usn/USN-1991-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1991-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2014-0008.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2014-0008.html"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704623","reference_id":"704623","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=704623"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=947882","reference_id":"947882","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=947882"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1914","reference_id":"CVE-2013-1914","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1914"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0769","reference_id":"RHSA-2013:0769","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0769"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1605","reference_id":"RHSA-2013:1605","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1605"},{"reference_url":"https://usn.ubuntu.com/1991-1/","reference_id":"USN-1991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1991-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923441?format=json","purl":"pkg:deb/debian/glibc@2.17-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.17-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2013-1914"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tdxd-r347-3yex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61768?format=json","vulnerability_id":"VCID-za5g-uj5p-5kd4","summary":"Multiple vulnerabilities have been found in GNU C Library,  the\n    worst of which allowing a local attacker to execute arbitrary code or cause\n    a Denial of Service .","references":[{"reference_url":"http://osvdb.org/89747","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/89747"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0769.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0769.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1605.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-1605.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0242.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0242.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-0242","reference_id":"","reference_type":"","scores":[{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84175","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84044","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84057","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84073","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84075","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84098","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84105","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84122","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84116","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84112","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84134","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84136","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.8414","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.84164","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02113","scoring_system":"epss","scoring_elements":"0.8417","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-0242"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242"},{"reference_url":"http://secunia.com/advisories/51951","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51951"},{"reference_url":"http://secunia.com/advisories/55113","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/55113"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/81707","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/81707"},{"reference_url":"http://sourceware.org/bugzilla/show_bug.cgi?id=15078","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/bugzilla/show_bug.cgi?id=15078"},{"reference_url":"http://sourceware.org/ml/libc-alpha/2013-01/msg00967.html","reference_id":"","reference_type":"","scores":[],"url":"http://sourceware.org/ml/libc-alpha/2013-01/msg00967.html"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:163","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:163"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/01/30/5","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/01/30/5"},{"reference_url":"http://www.securityfocus.com/bid/57638","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/57638"},{"reference_url":"http://www.securitytracker.com/id/1028063","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1028063"},{"reference_url":"http://www.ubuntu.com/usn/USN-1991-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1991-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2014-0008.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2014-0008.html"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699399","reference_id":"699399","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699399"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=905874","reference_id":"905874","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=905874"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-0242","reference_id":"CVE-2013-0242","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-0242"},{"reference_url":"https://security.gentoo.org/glsa/201503-04","reference_id":"GLSA-201503-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201503-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0769","reference_id":"RHSA-2013:0769","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0769"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1605","reference_id":"RHSA-2013:1605","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1605"},{"reference_url":"https://usn.ubuntu.com/1991-1/","reference_id":"USN-1991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1991-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923441?format=json","purl":"pkg:deb/debian/glibc@2.17-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.17-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923407?format=json","purl":"pkg:deb/debian/glibc@2.31-13%2Bdeb11u11?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-9nqp-tfvr-ayen"},{"vulnerability":"VCID-jswq-6ru6-wybc"},{"vulnerability":"VCID-kukb-s61t-pbc3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.31-13%252Bdeb11u11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923405?format=json","purl":"pkg:deb/debian/glibc@2.36-9%2Bdeb12u13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-ssnc-wdcf-sfc9"},{"vulnerability":"VCID-tcpv-4crc-zuap"},{"vulnerability":"VCID-us68-psx5-zude"},{"vulnerability":"VCID-zn6t-3mvb-wufm"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.36-9%252Bdeb12u13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923410?format=json","purl":"pkg:deb/debian/glibc@2.41-12%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"},{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.41-12%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923408?format=json","purl":"pkg:deb/debian/glibc@2.42-13?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3e43-r92j-hkd3"},{"vulnerability":"VCID-nwfb-xnks-1kg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-13%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923409?format=json","purl":"pkg:deb/debian/glibc@2.42-14?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-us68-psx5-zude"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-14%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072619?format=json","purl":"pkg:deb/debian/glibc@2.42-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.42-15%3Fdistro=trixie"}],"aliases":["CVE-2013-0242"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-za5g-uj5p-5kd4"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/glibc@2.17-2%3Fdistro=trixie"}