{"url":"http://public2.vulnerablecode.io/api/packages/930299?format=json","purl":"pkg:deb/debian/lz4@1.10.0-8?distro=trixie","type":"deb","namespace":"debian","name":"lz4","version":"1.10.0-8","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"1.10.0-9","latest_non_vulnerable_version":"1.10.0-10","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56282?format=json","vulnerability_id":"VCID-4gmw-eahs-2fg9","summary":"A vulnerability has been discovered in LZ4, which can lead to memory corruption.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3520.json","reference_id":"","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3520.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3520","reference_id":"","reference_type":"","scores":[{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33539","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33283","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33369","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33287","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33176","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33243","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33691","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33724","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33562","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33606","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33639","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33634","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33592","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.3357","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33547","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00138","scoring_system":"epss","scoring_elements":"0.33388","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34261","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34274","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3520"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3520","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3520"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1954559","reference_id":"1954559","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1954559"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987856","reference_id":"987856","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987856"},{"reference_url":"https://security.archlinux.org/ASA-202105-27","reference_id":"ASA-202105-27","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202105-27"},{"reference_url":"https://security.archlinux.org/AVG-1889","reference_id":"AVG-1889","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1889"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3520","reference_id":"CVE-2021-3520","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-3520"},{"reference_url":"https://security.gentoo.org/glsa/202406-04","reference_id":"GLSA-202406-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202406-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2575","reference_id":"RHSA-2021:2575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1345","reference_id":"RHSA-2022:1345","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1345"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5606","reference_id":"RHSA-2022:5606","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5606"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6407","reference_id":"RHSA-2022:6407","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6407"},{"reference_url":"https://usn.ubuntu.com/4968-1/","reference_id":"USN-4968-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4968-1/"},{"reference_url":"https://usn.ubuntu.com/4968-2/","reference_id":"USN-4968-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4968-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/930297?format=json","purl":"pkg:deb/debian/lz4@1.9.3-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.9.3-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930295?format=json","purl":"pkg:deb/debian/lz4@1.9.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.9.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930300?format=json","purl":"pkg:deb/debian/lz4@1.10.0-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930298?format=json","purl":"pkg:deb/debian/lz4@1.10.0-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930299?format=json","purl":"pkg:deb/debian/lz4@1.10.0-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062496?format=json","purl":"pkg:deb/debian/lz4@1.10.0-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076088?format=json","purl":"pkg:deb/debian/lz4@1.10.0-10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-10%3Fdistro=trixie"}],"aliases":["CVE-2021-3520"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4gmw-eahs-2fg9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86219?format=json","vulnerability_id":"VCID-dvc3-wa3b-b3eg","summary":"lz4: LZ4_decompress_generic() integer overflow (32-bit arches)","references":[{"reference_url":"http://blog.securitymouse.com/2014/07/i-was-wrong-proving-lz4-exploitable.html","reference_id":"","reference_type":"","scores":[],"url":"http://blog.securitymouse.com/2014/07/i-was-wrong-proving-lz4-exploitable.html"},{"reference_url":"http://fastcompression.blogspot.fr/2014/07/software-vulnerabilities-how-it-works.html","reference_id":"","reference_type":"","scores":[],"url":"http://fastcompression.blogspot.fr/2014/07/software-vulnerabilities-how-it-works.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4715.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4715.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4715","reference_id":"","reference_type":"","scores":[{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69428","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69215","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69231","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69251","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69233","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69282","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.693","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69322","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69306","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69278","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69317","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69326","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69307","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69358","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69365","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69371","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.6935","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00594","scoring_system":"epss","scoring_elements":"0.69393","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4715"},{"reference_url":"https://code.google.com/p/lz4/issues/detail?id=134","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/lz4/issues/detail?id=134"},{"reference_url":"https://code.google.com/p/lz4/source/detail?r=119","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/lz4/source/detail?r=119"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4715","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4715"},{"reference_url":"http://secunia.com/advisories/59770","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59770"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1115767","reference_id":"1115767","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1115767"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:yann_collet:lz4:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:yann_collet:lz4:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:yann_collet:lz4:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4715","reference_id":"CVE-2014-4715","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4715"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/930296?format=json","purl":"pkg:deb/debian/lz4@0.0~r119-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@0.0~r119-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930297?format=json","purl":"pkg:deb/debian/lz4@1.9.3-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.9.3-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930295?format=json","purl":"pkg:deb/debian/lz4@1.9.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.9.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930300?format=json","purl":"pkg:deb/debian/lz4@1.10.0-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930298?format=json","purl":"pkg:deb/debian/lz4@1.10.0-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930299?format=json","purl":"pkg:deb/debian/lz4@1.10.0-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062496?format=json","purl":"pkg:deb/debian/lz4@1.10.0-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076088?format=json","purl":"pkg:deb/debian/lz4@1.10.0-10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-10%3Fdistro=trixie"}],"aliases":["CVE-2014-4715"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dvc3-wa3b-b3eg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82355?format=json","vulnerability_id":"VCID-vb2b-utc4-2qgf","summary":"lz4: heap-based buffer overflow in LZ4_write32","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00069.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00070.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17543.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17543.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17543","reference_id":"","reference_type":"","scores":[{"value":"0.01442","scoring_system":"epss","scoring_elements":"0.80675","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01442","scoring_system":"epss","scoring_elements":"0.80871","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01442","scoring_system":"epss","scoring_elements":"0.80754","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01442","scoring_system":"epss","scoring_elements":"0.80739","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01442","scoring_system":"epss","scoring_elements":"0.80731","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01442","scoring_system":"epss","scoring_elements":"0.80768","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01442","scoring_system":"epss","scoring_elements":"0.80769","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01442","scoring_system":"epss","scoring_elements":"0.80828","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01442","scoring_system":"epss","scoring_elements":"0.8085","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01442","scoring_system":"epss","scoring_elements":"0.80683","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01442","scoring_system":"epss","scoring_elements":"0.80705","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01442","scoring_system":"epss","scoring_elements":"0.807","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01442","scoring_system":"epss","scoring_elements":"0.80728","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01442","scoring_system":"epss","scoring_elements":"0.80738","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.81061","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.81038","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.8107","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01482","scoring_system":"epss","scoring_elements":"0.81077","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17543"},{"reference_url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15941"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17543","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17543"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/lz4/lz4/compare/v1.9.1...v1.9.2"},{"reference_url":"https://github.com/lz4/lz4/issues/801","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/lz4/lz4/issues/801"},{"reference_url":"https://github.com/lz4/lz4/pull/756","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/lz4/lz4/pull/756"},{"reference_url":"https://github.com/lz4/lz4/pull/760","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/lz4/lz4/pull/760"},{"reference_url":"https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17%40%3Cissues.arrow.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/25015588b770d67470b7ba7ea49a305d6735dd7f00eabe7d50ec1e17%40%3Cissues.arrow.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6%40%3Cissues.arrow.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/543302d55e2d2da4311994e9b0debdc676bf3fd05e1a2be3407aa2d6%40%3Cissues.arrow.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357%40%3Cissues.arrow.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/793012683dc0fa6819b7c2560e6cf990811014c40c7d75412099c357%40%3Cissues.arrow.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3%40%3Cissues.arrow.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/9ff0606d16be2ab6a81619e1c9e23c3e251756638e36272c8c8b7fa3%40%3Cissues.arrow.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316%40%3Cissues.arrow.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/f0038c4fab2ee25aee849ebeff6b33b3aa89e07ccfb06b5c87b36316%40%3Cissues.arrow.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3%40%3Cdev.arrow.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/f506bc371d4a068d5d84d7361293568f61167d3a1c3e91f0def2d7d3%40%3Cdev.arrow.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26%40%3Cissues.kudu.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r0fb226357e7988a241b06b93bab065bcea2eb38658b382e485960e26%40%3Cissues.kudu.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720%40%3Cissues.kudu.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r4068ba81066792f2b4d208b39c4c4713c5d4c79bd8cb6c1904af5720%40%3Cissues.kudu.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960%40%3Cissues.kudu.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r7bc72200f94298bc9a0e35637f388deb53467ca4b2e2ad1ff66d8960%40%3Cissues.kudu.apache.org%3E"},{"reference_url":"https://security.netapp.com/advisory/ntap-20210723-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20210723-0001/"},{"reference_url":"https://www.oracle.com//security-alerts/cpujul2021.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com//security-alerts/cpujul2021.html"},{"reference_url":"https://www.oracle.com/security-alerts/cpuoct2020.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/security-alerts/cpuoct2020.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1765316","reference_id":"1765316","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1765316"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=943680","reference_id":"943680","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=943680"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:lz4_project:lz4:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:lz4_project:lz4:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:lz4_project:lz4:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17543","reference_id":"CVE-2019-17543","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:P/A:P"},{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17543"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:11035","reference_id":"RHSA-2025:11035","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:11035"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/930301?format=json","purl":"pkg:deb/debian/lz4@1.9.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.9.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930297?format=json","purl":"pkg:deb/debian/lz4@1.9.3-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.9.3-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930295?format=json","purl":"pkg:deb/debian/lz4@1.9.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.9.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930300?format=json","purl":"pkg:deb/debian/lz4@1.10.0-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930298?format=json","purl":"pkg:deb/debian/lz4@1.10.0-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930299?format=json","purl":"pkg:deb/debian/lz4@1.10.0-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062496?format=json","purl":"pkg:deb/debian/lz4@1.10.0-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076088?format=json","purl":"pkg:deb/debian/lz4@1.10.0-10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-10%3Fdistro=trixie"}],"aliases":["CVE-2019-17543"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vb2b-utc4-2qgf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86232?format=json","vulnerability_id":"VCID-yg6v-bv7p-m7c4","summary":"lz4: LZ4_decompress_generic() integer overflow","references":[{"reference_url":"http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html","reference_id":"","reference_type":"","scores":[],"url":"http://blog.securitymouse.com/2014/06/raising-lazarus-20-year-old-bug-that.html"},{"reference_url":"http://fastcompression.blogspot.fr/2014/06/debunking-lz4-20-years-old-bug-myth.html","reference_id":"","reference_type":"","scores":[],"url":"http://fastcompression.blogspot.fr/2014/06/debunking-lz4-20-years-old-bug-myth.html"},{"reference_url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=206204a1162b995e2185275167b22468c00d6b36","reference_id":"","reference_type":"","scores":[],"url":"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=206204a1162b995e2185275167b22468c00d6b36"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00025.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2014-07/msg00025.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4611.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-4611.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4611","reference_id":"","reference_type":"","scores":[{"value":"0.10105","scoring_system":"epss","scoring_elements":"0.93149","published_at":"2026-05-09T12:55:00Z"},{"value":"0.10105","scoring_system":"epss","scoring_elements":"0.93061","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10105","scoring_system":"epss","scoring_elements":"0.9307","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10105","scoring_system":"epss","scoring_elements":"0.93074","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10105","scoring_system":"epss","scoring_elements":"0.93073","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10105","scoring_system":"epss","scoring_elements":"0.93081","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10105","scoring_system":"epss","scoring_elements":"0.93086","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10105","scoring_system":"epss","scoring_elements":"0.9309","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10105","scoring_system":"epss","scoring_elements":"0.93088","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10105","scoring_system":"epss","scoring_elements":"0.93106","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10105","scoring_system":"epss","scoring_elements":"0.9311","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10105","scoring_system":"epss","scoring_elements":"0.93115","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10105","scoring_system":"epss","scoring_elements":"0.93121","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10105","scoring_system":"epss","scoring_elements":"0.93117","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10105","scoring_system":"epss","scoring_elements":"0.93124","published_at":"2026-05-05T12:55:00Z"},{"value":"0.10105","scoring_system":"epss","scoring_elements":"0.93139","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4611"},{"reference_url":"https://code.google.com/p/lz4/issues/detail?id=52","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/lz4/issues/detail?id=52"},{"reference_url":"https://code.google.com/p/lz4/source/detail?r=118","reference_id":"","reference_type":"","scores":[],"url":"https://code.google.com/p/lz4/source/detail?r=118"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4611"},{"reference_url":"http://secunia.com/advisories/59567","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59567"},{"reference_url":"http://secunia.com/advisories/59770","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/59770"},{"reference_url":"http://secunia.com/advisories/60238","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/60238"},{"reference_url":"https://github.com/torvalds/linux/commit/206204a1162b995e2185275167b22468c00d6b36","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/torvalds/linux/commit/206204a1162b995e2185275167b22468c00d6b36"},{"reference_url":"https://lists.apache.org/thread.html/r0038b5836e3bc91af3ff93721c0fc55d6543afab8cec47df7361fa0e%40%3Ccommon-dev.hadoop.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r0038b5836e3bc91af3ff93721c0fc55d6543afab8cec47df7361fa0e%40%3Ccommon-dev.hadoop.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r0addc410fdd680330054deb526323edb29e869e8d1097593f538e208%40%3Ccommon-issues.hadoop.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r0addc410fdd680330054deb526323edb29e869e8d1097593f538e208%40%3Ccommon-issues.hadoop.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r229456b1fa718e329232bd7ceca4bd3e81ac55f2ec4db7314f1d7fcb%40%3Ccommon-commits.hadoop.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r229456b1fa718e329232bd7ceca4bd3e81ac55f2ec4db7314f1d7fcb%40%3Ccommon-commits.hadoop.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r31eb601a8415525fa4a77b2f624c09be3550599898468ab96d508f90%40%3Ccommon-issues.hadoop.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r31eb601a8415525fa4a77b2f624c09be3550599898468ab96d508f90%40%3Ccommon-issues.hadoop.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r35b9f26c8ad91094d37bea0256012aeb065e32ff73dda5f934fefeb3%40%3Ccommon-issues.hadoop.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r35b9f26c8ad91094d37bea0256012aeb065e32ff73dda5f934fefeb3%40%3Ccommon-issues.hadoop.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r5c9b4826bbd8933e4688db62f6ed9008cabb8f26bcea84d4e309caf7%40%3Ccommon-issues.hadoop.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r5c9b4826bbd8933e4688db62f6ed9008cabb8f26bcea84d4e309caf7%40%3Ccommon-issues.hadoop.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r62f398f40f522cf59cfd89428835d4ca633a9764d82e4b7a12c37add%40%3Ccommon-issues.hadoop.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r62f398f40f522cf59cfd89428835d4ca633a9764d82e4b7a12c37add%40%3Ccommon-issues.hadoop.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r6794c8ff8f339d95a80415b0afbe71d5eda1b97bdaca19bec78d0f8f%40%3Ccommon-commits.hadoop.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r6794c8ff8f339d95a80415b0afbe71d5eda1b97bdaca19bec78d0f8f%40%3Ccommon-commits.hadoop.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r6c998e1a47c1c3fba61a80d0dcc4b39c7fc452400c7051f685b76c0b%40%3Ccommon-issues.hadoop.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r6c998e1a47c1c3fba61a80d0dcc4b39c7fc452400c7051f685b76c0b%40%3Ccommon-issues.hadoop.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r8e0111cd64a455b0a33ab12a50fba724a0218f283c759f16da8864c2%40%3Ccommon-issues.hadoop.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r8e0111cd64a455b0a33ab12a50fba724a0218f283c759f16da8864c2%40%3Ccommon-issues.hadoop.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/ra72a62803eeabb6a8dc65032ca81b13ab75c271e4dff2df27c2915bb%40%3Ccommon-issues.hadoop.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/ra72a62803eeabb6a8dc65032ca81b13ab75c271e4dff2df27c2915bb%40%3Ccommon-issues.hadoop.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rb301598bf24ecb6f4ce405c2a2ae23905fc4dce64277c020fc3883e5%40%3Ccommon-issues.hadoop.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/rb301598bf24ecb6f4ce405c2a2ae23905fc4dce64277c020fc3883e5%40%3Ccommon-issues.hadoop.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rf4cb13d6ee891dfe2307389c8c6594a0cb10d9efb72be8bd2f97cb76%40%3Ccommon-issues.hadoop.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/rf4cb13d6ee891dfe2307389c8c6594a0cb10d9efb72be8bd2f97cb76%40%3Ccommon-issues.hadoop.apache.org%3E"},{"reference_url":"https://www.securitymouse.com/lms-2014-06-16-5","reference_id":"","reference_type":"","scores":[],"url":"https://www.securitymouse.com/lms-2014-06-16-5"},{"reference_url":"https://www.securitymouse.com/lms-2014-06-16-6","reference_id":"","reference_type":"","scores":[],"url":"https://www.securitymouse.com/lms-2014-06-16-6"},{"reference_url":"http://twitter.com/djrbliss/statuses/484931749013495809","reference_id":"","reference_type":"","scores":[],"url":"http://twitter.com/djrbliss/statuses/484931749013495809"},{"reference_url":"http://twitter.com/djrbliss/statuses/485042901399789568","reference_id":"","reference_type":"","scores":[],"url":"http://twitter.com/djrbliss/statuses/485042901399789568"},{"reference_url":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2","reference_id":"","reference_type":"","scores":[],"url":"http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.15.2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/06/26/24","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/06/26/24"},{"reference_url":"http://www.securitytracker.com/id/1030491","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1030491"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1112436","reference_id":"1112436","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1112436"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4611","reference_id":"CVE-2014-4611","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4611"},{"reference_url":"https://usn.ubuntu.com/2287-1/","reference_id":"USN-2287-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2287-1/"},{"reference_url":"https://usn.ubuntu.com/2288-1/","reference_id":"USN-2288-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2288-1/"},{"reference_url":"https://usn.ubuntu.com/2289-1/","reference_id":"USN-2289-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2289-1/"},{"reference_url":"https://usn.ubuntu.com/2290-1/","reference_id":"USN-2290-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2290-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/930296?format=json","purl":"pkg:deb/debian/lz4@0.0~r119-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@0.0~r119-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930297?format=json","purl":"pkg:deb/debian/lz4@1.9.3-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.9.3-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930295?format=json","purl":"pkg:deb/debian/lz4@1.9.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.9.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930300?format=json","purl":"pkg:deb/debian/lz4@1.10.0-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930298?format=json","purl":"pkg:deb/debian/lz4@1.10.0-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/930299?format=json","purl":"pkg:deb/debian/lz4@1.10.0-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062496?format=json","purl":"pkg:deb/debian/lz4@1.10.0-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1076088?format=json","purl":"pkg:deb/debian/lz4@1.10.0-10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-10%3Fdistro=trixie"}],"aliases":["CVE-2014-4611"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yg6v-bv7p-m7c4"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/lz4@1.10.0-8%3Fdistro=trixie"}