{"url":"http://public2.vulnerablecode.io/api/packages/925446?format=json","purl":"pkg:deb/debian/inetutils@2:2.4-3?distro=trixie","type":"deb","namespace":"debian","name":"inetutils","version":"2:2.4-3","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2:2.6-3+deb13u1","latest_non_vulnerable_version":"2:2.8-2","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95688?format=json","vulnerability_id":"VCID-m459-kwuf-2kd4","summary":"GNU inetutils before 2.5 may allow privilege escalation because of unchecked return values of set*id() family functions in ftpd, rcp, rlogin, rsh, rshd, and uucpd. This is, for example, relevant if the setuid system call fails when a process is trying to drop privileges before letting an ordinary user control the activities of the process.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-40303","reference_id":"","reference_type":"","scores":[{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16759","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16819","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16604","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16689","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16743","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16723","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.1668","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16622","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16558","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16566","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16501","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16489","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16445","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16313","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16431","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16537","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16502","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16536","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16607","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16606","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-40303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40303"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1049365","reference_id":"1049365","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1049365"},{"reference_url":"https://usn.ubuntu.com/6304-1/","reference_id":"USN-6304-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6304-1/"},{"reference_url":"https://usn.ubuntu.com/7781-1/","reference_id":"USN-7781-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7781-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/925435?format=json","purl":"pkg:deb/debian/inetutils@2:2.0-1%2Bdeb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xfm-qpgd-ebaw"},{"vulnerability":"VCID-hm61-cd18-hycu"},{"vulnerability":"VCID-wfv6-euzm-7bhc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/inetutils@2:2.0-1%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925433?format=json","purl":"pkg:deb/debian/inetutils@2:2.4-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-6xfm-qpgd-ebaw"},{"vulnerability":"VCID-hm61-cd18-hycu"},{"vulnerability":"VCID-wfv6-euzm-7bhc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/inetutils@2:2.4-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925446?format=json","purl":"pkg:deb/debian/inetutils@2:2.4-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/inetutils@2:2.4-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925437?format=json","purl":"pkg:deb/debian/inetutils@2:2.6-3%2Bdeb13u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-hm61-cd18-hycu"},{"vulnerability":"VCID-wfv6-euzm-7bhc"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/inetutils@2:2.6-3%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/925436?format=json","purl":"pkg:deb/debian/inetutils@2:2.7-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/inetutils@2:2.7-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1088686?format=json","purl":"pkg:deb/debian/inetutils@2:2.8-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/inetutils@2:2.8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1104218?format=json","purl":"pkg:deb/debian/inetutils@2:2.8-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/inetutils@2:2.8-2%3Fdistro=trixie"}],"aliases":["CVE-2023-40303"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m459-kwuf-2kd4"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/inetutils@2:2.4-3%3Fdistro=trixie"}