{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","type":"deb","namespace":"debian","name":"openafs","version":"1.8.13.2-1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"1.8.14-1","latest_non_vulnerable_version":"1.8.14-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92611?format=json","vulnerability_id":"VCID-14pw-7wca-dya3","summary":"OpenAFS 1.6.8 does not properly clear the fields in the host structure, which allows remote attackers to cause a denial of service (uninitialized memory access and crash) via unspecified vectors related to TMAY requests.","references":[{"reference_url":"http://gerrit.openafs.org/#change%2C11283","reference_id":"","reference_type":"","scores":[],"url":"http://gerrit.openafs.org/#change%2C11283"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4044","reference_id":"","reference_type":"","scores":[{"value":"0.00603","scoring_system":"epss","scoring_elements":"0.69634","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00603","scoring_system":"epss","scoring_elements":"0.69474","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00603","scoring_system":"epss","scoring_elements":"0.69485","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00603","scoring_system":"epss","scoring_elements":"0.69501","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00603","scoring_system":"epss","scoring_elements":"0.6948","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00603","scoring_system":"epss","scoring_elements":"0.69531","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00603","scoring_system":"epss","scoring_elements":"0.69547","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00603","scoring_system":"epss","scoring_elements":"0.69568","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00603","scoring_system":"epss","scoring_elements":"0.69553","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00603","scoring_system":"epss","scoring_elements":"0.69539","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00603","scoring_system":"epss","scoring_elements":"0.69579","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00603","scoring_system":"epss","scoring_elements":"0.69589","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00603","scoring_system":"epss","scoring_elements":"0.69569","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00603","scoring_system":"epss","scoring_elements":"0.69622","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00603","scoring_system":"epss","scoring_elements":"0.69629","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-4044"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4044","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4044"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/06/12/1","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/06/12/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/06/13/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2014/06/13/3"},{"reference_url":"http://www.securityfocus.com/bid/68003","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/68003"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4044","reference_id":"CVE-2014-4044","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-4044"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933434?format=json","purl":"pkg:deb/debian/openafs@1.6.9-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.6.9-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2014-4044"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-14pw-7wca-dya3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95917?format=json","vulnerability_id":"VCID-2dzj-pdn1-gffv","summary":"An authenticated user can provide a malformed ACL to the fileserver's StoreACL RPC, causing the fileserver to crash, possibly expose uninitialized memory, and possibly store garbage data in the audit log. Malformed ACLs provided in responses to client FetchACL RPCs can cause client processes to crash and possibly expose uninitialized memory into other ACLs stored on the server.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10396","reference_id":"","reference_type":"","scores":[{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.35775","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36177","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36125","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.35894","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.35862","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36272","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36305","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.3614","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.3619","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36208","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36213","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36176","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.3615","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00154","scoring_system":"epss","scoring_elements":"0.36193","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10396"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10396","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10396"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087406","reference_id":"1087406","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087406"},{"reference_url":"https://www.openafs.org/pages/security/OPENAFS-SA-2024-002.txt","reference_id":"OPENAFS-SA-2024-002.txt","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T15:58:56Z/"}],"url":"https://www.openafs.org/pages/security/OPENAFS-SA-2024-002.txt"},{"reference_url":"https://www.openafs.org/security","reference_id":"security","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T15:58:56Z/"}],"url":"https://www.openafs.org/security"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933443?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933444?format=json","purl":"pkg:deb/debian/openafs@1.8.13-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2024-10396"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2dzj-pdn1-gffv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60373?format=json","vulnerability_id":"VCID-2q1w-btf8-nkct","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3283","reference_id":"","reference_type":"","scores":[{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73437","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73446","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73468","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.7344","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73477","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73491","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73515","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73495","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73487","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.7353","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73539","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73532","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73565","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73576","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00768","scoring_system":"epss","scoring_elements":"0.73575","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3282","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3285","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3285"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6587"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933435?format=json","purl":"pkg:deb/debian/openafs@1.6.13-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.6.13-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2015-3283"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2q1w-btf8-nkct"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94087?format=json","vulnerability_id":"VCID-3thg-8s1s-zyad","summary":"OpenAFS before 1.6.24 and 1.8.x before 1.8.5 is prone to an information disclosure vulnerability because uninitialized scalars are sent over the network to a peer.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-18602","reference_id":"","reference_type":"","scores":[{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61507","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61512","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61356","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61433","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61461","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61432","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61479","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61494","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61515","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61502","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61482","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61521","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61525","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.6151","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61496","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-18602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18602"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/11/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/11/msg00002.html"},{"reference_url":"https://openafs.org/pages/security/OPENAFS-SA-2019-002.txt","reference_id":"","reference_type":"","scores":[],"url":"https://openafs.org/pages/security/OPENAFS-SA-2019-002.txt"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=943587","reference_id":"943587","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=943587"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-18602","reference_id":"CVE-2019-18602","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-18602"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933442?format=json","purl":"pkg:deb/debian/openafs@1.8.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2019-18602"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3thg-8s1s-zyad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95918?format=json","vulnerability_id":"VCID-3wzs-pca6-kfgu","summary":"A malicious server can crash the OpenAFS cache manager and other client utilities, and possibly execute arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10397","reference_id":"","reference_type":"","scores":[{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.35495","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00149","scoring_system":"epss","scoring_elements":"0.3552","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42158","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42245","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.4224","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42346","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42395","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42402","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42425","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42389","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.4236","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42409","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42384","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00203","scoring_system":"epss","scoring_elements":"0.42313","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10397"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087406","reference_id":"1087406","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087406"},{"reference_url":"https://www.openafs.org/pages/security/OPENAFS-SA-2024-003.txt","reference_id":"OPENAFS-SA-2024-003.txt","reference_type":"","scores":[{"value":"7.7","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T15:46:42Z/"}],"url":"https://www.openafs.org/pages/security/OPENAFS-SA-2024-003.txt"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933443?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933444?format=json","purl":"pkg:deb/debian/openafs@1.8.13-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2024-10397"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3wzs-pca6-kfgu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60374?format=json","vulnerability_id":"VCID-4nmg-8ntm-wkh6","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3284","reference_id":"","reference_type":"","scores":[{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19474","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19607","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19654","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19376","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19454","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19505","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19509","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19462","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19404","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19365","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19386","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19285","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19274","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19234","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3282","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3285","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3285"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6587"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933435?format=json","purl":"pkg:deb/debian/openafs@1.6.13-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.6.13-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2015-3284"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4nmg-8ntm-wkh6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/95916?format=json","vulnerability_id":"VCID-5z4c-t4de-fkhj","summary":"A local user can bypass the OpenAFS PAG (Process Authentication Group) throttling mechanism in Unix clients, allowing the user to create a PAG using an existing id number, effectively joining the PAG and letting the user steal the credentials in that PAG.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10394","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.00988","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02095","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02016","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02101","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02074","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02068","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.0205","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02052","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02069","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02044","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02028","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02025","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00013","scoring_system":"epss","scoring_elements":"0.02002","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-10394"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10394","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10394"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087406","reference_id":"1087406","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087406"},{"reference_url":"https://www.openafs.org/pages/security/OPENAFS-SA-2024-001.txt","reference_id":"OPENAFS-SA-2024-001.txt","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T15:59:42Z/"}],"url":"https://www.openafs.org/pages/security/OPENAFS-SA-2024-001.txt"},{"reference_url":"https://www.openafs.org/security","reference_id":"security","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-19T15:59:42Z/"}],"url":"https://www.openafs.org/security"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933443?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933444?format=json","purl":"pkg:deb/debian/openafs@1.8.13-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2024-10394"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5z4c-t4de-fkhj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94086?format=json","vulnerability_id":"VCID-6yfs-sxke-hbat","summary":"OpenAFS before 1.6.24 and 1.8.x before 1.8.5 is prone to denial of service from unserialized data access because remote attackers can make a series of VOTE_Debug RPC calls to crash a database server within the SVOTE_Debug RPC handler.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-18601","reference_id":"","reference_type":"","scores":[{"value":"0.01102","scoring_system":"epss","scoring_elements":"0.78146","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01102","scoring_system":"epss","scoring_elements":"0.78132","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01102","scoring_system":"epss","scoring_elements":"0.78009","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01102","scoring_system":"epss","scoring_elements":"0.78017","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01102","scoring_system":"epss","scoring_elements":"0.78046","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01102","scoring_system":"epss","scoring_elements":"0.78029","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01102","scoring_system":"epss","scoring_elements":"0.78055","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01102","scoring_system":"epss","scoring_elements":"0.78059","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01102","scoring_system":"epss","scoring_elements":"0.78085","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01102","scoring_system":"epss","scoring_elements":"0.78068","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01102","scoring_system":"epss","scoring_elements":"0.78065","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01102","scoring_system":"epss","scoring_elements":"0.781","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01102","scoring_system":"epss","scoring_elements":"0.78099","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01102","scoring_system":"epss","scoring_elements":"0.78093","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01102","scoring_system":"epss","scoring_elements":"0.78126","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-18601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18601"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/11/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/11/msg00002.html"},{"reference_url":"https://openafs.org/pages/security/OPENAFS-SA-2019-003.txt","reference_id":"","reference_type":"","scores":[],"url":"https://openafs.org/pages/security/OPENAFS-SA-2019-003.txt"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=943587","reference_id":"943587","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=943587"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-18601","reference_id":"CVE-2019-18601","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-18601"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933442?format=json","purl":"pkg:deb/debian/openafs@1.8.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2019-18601"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6yfs-sxke-hbat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31741?format=json","vulnerability_id":"VCID-871g-xjek-yue3","summary":"Multiple vulnerabilities have been found in OpenAFS, worst of which\n    can allow attackers to execute arbitrary code","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1794","reference_id":"","reference_type":"","scores":[{"value":"0.02802","scoring_system":"epss","scoring_elements":"0.86162","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02802","scoring_system":"epss","scoring_elements":"0.86053","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02802","scoring_system":"epss","scoring_elements":"0.86063","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02802","scoring_system":"epss","scoring_elements":"0.8608","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02802","scoring_system":"epss","scoring_elements":"0.86079","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02802","scoring_system":"epss","scoring_elements":"0.86098","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02802","scoring_system":"epss","scoring_elements":"0.86109","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02802","scoring_system":"epss","scoring_elements":"0.86123","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02802","scoring_system":"epss","scoring_elements":"0.86122","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02802","scoring_system":"epss","scoring_elements":"0.86118","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02802","scoring_system":"epss","scoring_elements":"0.86135","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02802","scoring_system":"epss","scoring_elements":"0.8614","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02802","scoring_system":"epss","scoring_elements":"0.86133","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02802","scoring_system":"epss","scoring_elements":"0.86153","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02802","scoring_system":"epss","scoring_elements":"0.86163","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1794"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1794","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1794"},{"reference_url":"http://secunia.com/advisories/52342","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/52342"},{"reference_url":"http://secunia.com/advisories/52480","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/52480"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/82582","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/82582"},{"reference_url":"http://www.debian.org/security/2013/dsa-2638","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2638"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:244","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:244"},{"reference_url":"http://www.openafs.org/pages/security/OPENAFS-SA-2013-001.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.openafs.org/pages/security/OPENAFS-SA-2013-001.txt"},{"reference_url":"http://www.securityfocus.com/bid/58299","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/58299"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.25:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.25:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.25:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.27:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.27:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.27:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.32:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.32:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.32:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.33:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.33:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.33:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.34:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.34:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.34:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.35:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.35:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.35:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.36:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.36:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.36:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.37:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.37:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.37:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.38:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.38:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.38:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.39:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.39:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.39:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.51:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.51:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.51:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.52:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.52:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.52:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.53:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.53:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.53:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.54:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.54:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.54:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.55:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.55:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.55:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.56:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.56:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.56:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.57:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.57:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.57:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.58:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.58:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.58:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.59:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.59:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.59:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.60:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.60:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.60:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.61:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.61:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.61:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.62:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.62:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.62:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.63:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.63:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.63:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.65:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.65:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.65:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.66:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.66:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.66:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.67:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.67:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.67:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.68:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.68:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.68:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.69:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.69:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.69:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.70:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.70:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.70:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.71:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.71:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.71:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.72:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.72:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.72:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.73:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.73:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.73:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.74:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.74:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.74:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.75:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.75:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.75:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.76:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.76:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.76:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.77:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.77:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.77:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.78:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.78:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.78:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1794","reference_id":"CVE-2013-1794","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1794"},{"reference_url":"https://security.gentoo.org/glsa/201404-05","reference_id":"GLSA-201404-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201404-05"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933431?format=json","purl":"pkg:deb/debian/openafs@1.6.1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.6.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2013-1794"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-871g-xjek-yue3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31738?format=json","vulnerability_id":"VCID-89t9-fx7m-sfdc","summary":"Multiple vulnerabilities have been found in OpenAFS, worst of which\n    can allow attackers to execute arbitrary code","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1251","reference_id":"","reference_type":"","scores":[{"value":"0.12626","scoring_system":"epss","scoring_elements":"0.9393","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12626","scoring_system":"epss","scoring_elements":"0.93939","published_at":"2026-04-02T12:55:00Z"},{"value":"0.12626","scoring_system":"epss","scoring_elements":"0.93949","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12626","scoring_system":"epss","scoring_elements":"0.93952","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12626","scoring_system":"epss","scoring_elements":"0.9396","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12626","scoring_system":"epss","scoring_elements":"0.93964","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12626","scoring_system":"epss","scoring_elements":"0.93967","published_at":"2026-04-13T12:55:00Z"},{"value":"0.12626","scoring_system":"epss","scoring_elements":"0.93983","published_at":"2026-04-16T12:55:00Z"},{"value":"0.12626","scoring_system":"epss","scoring_elements":"0.93988","published_at":"2026-04-18T12:55:00Z"},{"value":"0.12626","scoring_system":"epss","scoring_elements":"0.93989","published_at":"2026-04-21T12:55:00Z"},{"value":"0.12626","scoring_system":"epss","scoring_elements":"0.93991","published_at":"2026-04-24T12:55:00Z"},{"value":"0.12626","scoring_system":"epss","scoring_elements":"0.9399","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1251"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1251","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1251"},{"reference_url":"https://security.gentoo.org/glsa/201101-05","reference_id":"GLSA-201101-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201101-05"},{"reference_url":"https://security.gentoo.org/glsa/201404-05","reference_id":"GLSA-201404-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201404-05"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933429?format=json","purl":"pkg:deb/debian/openafs@1.4.10%2Bdfsg1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.4.10%252Bdfsg1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2009-1251"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-89t9-fx7m-sfdc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92901?format=json","vulnerability_id":"VCID-8hn8-d5rz-v7gn","summary":"The client in OpenAFS before 1.6.17 does not properly initialize the (1) AFSStoreStatus, (2) AFSStoreVolumeStatus, (3) VldbListByAttributes, and (4) ListAddrByAttributes structures, which might allow remote attackers to obtain sensitive memory information by leveraging access to RPC call traffic.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4536","reference_id":"","reference_type":"","scores":[{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52904","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52943","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52857","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52883","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52908","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52877","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52928","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52921","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52971","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52955","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52939","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52976","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52983","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52967","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00296","scoring_system":"epss","scoring_elements":"0.52933","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4536"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4536","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4536"},{"reference_url":"https://lists.openafs.org/pipermail/openafs-announce/2016/000496.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.openafs.org/pipermail/openafs-announce/2016/000496.html"},{"reference_url":"https://www.openafs.org/dl/openafs/1.6.17/RELNOTES-1.6.17","reference_id":"","reference_type":"","scores":[],"url":"https://www.openafs.org/dl/openafs/1.6.17/RELNOTES-1.6.17"},{"reference_url":"https://www.openafs.org/pages/security/OPENAFS-SA-2016-002.txt","reference_id":"","reference_type":"","scores":[],"url":"https://www.openafs.org/pages/security/OPENAFS-SA-2016-002.txt"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4536","reference_id":"CVE-2016-4536","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4536"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933438?format=json","purl":"pkg:deb/debian/openafs@1.6.17-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.6.17-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2016-4536"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8hn8-d5rz-v7gn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31739?format=json","vulnerability_id":"VCID-9f4v-4t8y-xfhf","summary":"Multiple vulnerabilities have been found in OpenAFS, worst of which\n    can allow attackers to execute arbitrary code","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0430","reference_id":"","reference_type":"","scores":[{"value":"0.02959","scoring_system":"epss","scoring_elements":"0.86521","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02959","scoring_system":"epss","scoring_elements":"0.86415","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02959","scoring_system":"epss","scoring_elements":"0.86426","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02959","scoring_system":"epss","scoring_elements":"0.86445","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02959","scoring_system":"epss","scoring_elements":"0.86464","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02959","scoring_system":"epss","scoring_elements":"0.86474","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02959","scoring_system":"epss","scoring_elements":"0.8649","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02959","scoring_system":"epss","scoring_elements":"0.86486","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02959","scoring_system":"epss","scoring_elements":"0.86481","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02959","scoring_system":"epss","scoring_elements":"0.86496","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02959","scoring_system":"epss","scoring_elements":"0.86501","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02959","scoring_system":"epss","scoring_elements":"0.86494","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02959","scoring_system":"epss","scoring_elements":"0.86513","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02959","scoring_system":"epss","scoring_elements":"0.86522","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0430"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0430","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0430"},{"reference_url":"http://secunia.com/advisories/43371","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43371"},{"reference_url":"http://secunia.com/advisories/43407","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43407"},{"reference_url":"http://www.debian.org/security/2011/dsa-2168","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2011/dsa-2168"},{"reference_url":"http://www.securityfocus.com/bid/46428","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/46428"},{"reference_url":"http://www.securitytracker.com/id?1025095","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1025095"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0410","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0410"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0411","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0411"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.4.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.4.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0430","reference_id":"CVE-2011-0430","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0430"},{"reference_url":"https://security.gentoo.org/glsa/201404-05","reference_id":"GLSA-201404-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201404-05"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933430?format=json","purl":"pkg:deb/debian/openafs@1.4.14%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.4.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2011-0430"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9f4v-4t8y-xfhf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31742?format=json","vulnerability_id":"VCID-9wde-x2a2-nybs","summary":"Multiple vulnerabilities have been found in OpenAFS, worst of which\n    can allow attackers to execute arbitrary code","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1795","reference_id":"","reference_type":"","scores":[{"value":"0.02115","scoring_system":"epss","scoring_elements":"0.84184","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02115","scoring_system":"epss","scoring_elements":"0.84052","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02115","scoring_system":"epss","scoring_elements":"0.84065","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02115","scoring_system":"epss","scoring_elements":"0.84082","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02115","scoring_system":"epss","scoring_elements":"0.84084","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02115","scoring_system":"epss","scoring_elements":"0.84107","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02115","scoring_system":"epss","scoring_elements":"0.84113","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02115","scoring_system":"epss","scoring_elements":"0.84131","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02115","scoring_system":"epss","scoring_elements":"0.84125","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02115","scoring_system":"epss","scoring_elements":"0.84121","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02115","scoring_system":"epss","scoring_elements":"0.84143","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02115","scoring_system":"epss","scoring_elements":"0.84145","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02115","scoring_system":"epss","scoring_elements":"0.84148","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02115","scoring_system":"epss","scoring_elements":"0.84172","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02115","scoring_system":"epss","scoring_elements":"0.84179","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1795"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1795","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1795"},{"reference_url":"http://secunia.com/advisories/52342","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/52342"},{"reference_url":"http://secunia.com/advisories/52480","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/52480"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/82585","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/82585"},{"reference_url":"http://www.debian.org/security/2013/dsa-2638","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2638"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:244","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2014:244"},{"reference_url":"http://www.openafs.org/pages/security/OPENAFS-SA-2013-002.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.openafs.org/pages/security/OPENAFS-SA-2013-002.txt"},{"reference_url":"http://www.securityfocus.com/bid/58300","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/58300"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.25:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.25:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.25:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.27:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.27:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.27:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.32:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.32:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.32:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.33:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.33:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.33:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.34:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.34:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.34:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.35:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.35:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.35:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.36:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.36:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.36:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.37:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.37:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.37:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.38:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.38:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.38:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.39:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.39:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.39:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.50:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.50:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.50:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.51:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.51:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.51:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.52:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.52:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.52:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.53:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.53:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.53:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.54:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.54:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.54:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.55:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.55:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.55:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.56:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.56:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.56:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.57:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.57:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.57:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.58:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.58:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.58:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.59:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.59:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.59:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.60:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.60:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.60:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.61:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.61:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.61:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.62:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.62:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.62:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.63:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.63:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.63:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.64:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.64:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.64:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.65:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.65:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.65:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.66:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.66:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.66:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.67:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.67:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.67:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.68:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.68:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.68:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.69:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.69:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.69:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.70:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.70:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.70:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.71:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.71:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.71:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.72:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.72:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.72:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.73:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.73:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.73:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.74:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.74:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.74:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.75:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.75:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.75:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.76:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.76:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.76:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.77:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.77:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.77:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.78:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.78:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.78:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1795","reference_id":"CVE-2013-1795","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1795"},{"reference_url":"https://security.gentoo.org/glsa/201404-05","reference_id":"GLSA-201404-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201404-05"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933431?format=json","purl":"pkg:deb/debian/openafs@1.6.1-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.6.1-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2013-1795"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9wde-x2a2-nybs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31744?format=json","vulnerability_id":"VCID-b4kv-x3b9-f7ab","summary":"Multiple vulnerabilities have been found in OpenAFS, worst of which\n    can allow attackers to execute arbitrary code","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4135","reference_id":"","reference_type":"","scores":[{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51584","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51636","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51661","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51621","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51676","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51672","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.5172","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51698","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51681","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51723","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.5173","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.5171","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51667","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00283","scoring_system":"epss","scoring_elements":"0.51627","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4135"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4135"},{"reference_url":"https://security.gentoo.org/glsa/201404-05","reference_id":"GLSA-201404-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201404-05"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933432?format=json","purl":"pkg:deb/debian/openafs@1.6.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.6.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2013-4135"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b4kv-x3b9-f7ab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31740?format=json","vulnerability_id":"VCID-bjm2-npbf-mkh8","summary":"Multiple vulnerabilities have been found in OpenAFS, worst of which\n    can allow attackers to execute arbitrary code","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0431","reference_id":"","reference_type":"","scores":[{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.71106","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.70954","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.70964","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.70982","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.70957","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.70999","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.71014","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.71036","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.71021","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.71004","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.7105","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.71057","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.71037","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.71093","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00656","scoring_system":"epss","scoring_elements":"0.71102","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-0431"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0431","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0431"},{"reference_url":"http://secunia.com/advisories/43371","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43371"},{"reference_url":"http://secunia.com/advisories/43407","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/43407"},{"reference_url":"http://www.debian.org/security/2011/dsa-2168","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2011/dsa-2168"},{"reference_url":"http://www.securityfocus.com/bid/46428","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/46428"},{"reference_url":"http://www.securitytracker.com/id?1025095","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1025095"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0410","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0410"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0411","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2011/0411"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.4.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.4.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0431","reference_id":"CVE-2011-0431","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-0431"},{"reference_url":"https://security.gentoo.org/glsa/201404-05","reference_id":"GLSA-201404-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201404-05"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933430?format=json","purl":"pkg:deb/debian/openafs@1.4.14%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.4.14%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2011-0431"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bjm2-npbf-mkh8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31737?format=json","vulnerability_id":"VCID-cqa2-8kby-nyc6","summary":"Multiple vulnerabilities have been found in OpenAFS, worst of which\n    can allow attackers to execute arbitrary code","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1250","reference_id":"","reference_type":"","scores":[{"value":"0.05847","scoring_system":"epss","scoring_elements":"0.90505","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05847","scoring_system":"epss","scoring_elements":"0.90509","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05847","scoring_system":"epss","scoring_elements":"0.9052","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05847","scoring_system":"epss","scoring_elements":"0.90526","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05847","scoring_system":"epss","scoring_elements":"0.90538","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05847","scoring_system":"epss","scoring_elements":"0.90545","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05847","scoring_system":"epss","scoring_elements":"0.90553","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05847","scoring_system":"epss","scoring_elements":"0.90547","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05847","scoring_system":"epss","scoring_elements":"0.90564","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05847","scoring_system":"epss","scoring_elements":"0.90563","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05847","scoring_system":"epss","scoring_elements":"0.90577","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05847","scoring_system":"epss","scoring_elements":"0.90578","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05847","scoring_system":"epss","scoring_elements":"0.90573","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1250"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1250","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1250"},{"reference_url":"https://security.gentoo.org/glsa/201101-05","reference_id":"GLSA-201101-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201101-05"},{"reference_url":"https://security.gentoo.org/glsa/201404-05","reference_id":"GLSA-201404-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201404-05"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933429?format=json","purl":"pkg:deb/debian/openafs@1.4.10%2Bdfsg1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.4.10%252Bdfsg1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2009-1250"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cqa2-8kby-nyc6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41411?format=json","vulnerability_id":"VCID-ctbh-7muq-dbht","summary":"OpenAFS is subject to a design flaw that could allow privilege escalation\n    on the client.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1507","reference_id":"","reference_type":"","scores":[{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80223","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80231","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80251","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.8024","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80267","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80296","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80281","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.82505","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.82509","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.82432","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.82467","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.82469","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.82474","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01726","scoring_system":"epss","scoring_elements":"0.82495","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-1507"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1507","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1507"},{"reference_url":"http://secunia.com/advisories/24582","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24582"},{"reference_url":"http://secunia.com/advisories/24599","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24599"},{"reference_url":"http://secunia.com/advisories/24607","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24607"},{"reference_url":"http://secunia.com/advisories/24720","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/24720"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200704-03.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200704-03.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33180","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/33180"},{"reference_url":"http://www.debian.org/security/2007/dsa-1271","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2007/dsa-1271"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:066","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:066"},{"reference_url":"http://www.openafs.org/pipermail/openafs-announce/2007/000185.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.openafs.org/pipermail/openafs-announce/2007/000185.html"},{"reference_url":"http://www.openafs.org/pipermail/openafs-announce/2007/000186.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.openafs.org/pipermail/openafs-announce/2007/000186.html"},{"reference_url":"http://www.openafs.org/pipermail/openafs-announce/2007/000187.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.openafs.org/pipermail/openafs-announce/2007/000187.html"},{"reference_url":"http://www.securityfocus.com/bid/23060","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/23060"},{"reference_url":"http://www.securitytracker.com/id?1017807","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1017807"},{"reference_url":"http://www.vupen.com/english/advisories/2007/1033","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/1033"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-1507","reference_id":"CVE-2007-1507","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-1507"},{"reference_url":"https://security.gentoo.org/glsa/200704-03","reference_id":"GLSA-200704-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200704-03"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933427?format=json","purl":"pkg:deb/debian/openafs@1.4.2-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.4.2-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2007-1507"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ctbh-7muq-dbht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60371?format=json","vulnerability_id":"VCID-dahm-yt6t-ruap","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3282","reference_id":"","reference_type":"","scores":[{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64549","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64603","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64631","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64589","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64638","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64654","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64671","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64658","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.6463","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64666","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64677","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64663","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64683","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64695","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.6469","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3282","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3285","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3285"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6587"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933435?format=json","purl":"pkg:deb/debian/openafs@1.6.13-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.6.13-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2015-3282"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dahm-yt6t-ruap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/92999?format=json","vulnerability_id":"VCID-dqvc-h6tg-nycg","summary":"OpenAFS 1.6.19 and earlier allows remote attackers to obtain sensitive directory information via vectors involving the (1) client cache partition, (2) fileserver vice partition, or (3) certain RPC responses.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9772","reference_id":"","reference_type":"","scores":[{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49809","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49846","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49873","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49825","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.4988","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49874","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49892","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49864","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49865","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49911","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49912","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49884","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.4987","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49878","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00264","scoring_system":"epss","scoring_elements":"0.49833","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-9772"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9772","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9772"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=846922","reference_id":"846922","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=846922"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933439?format=json","purl":"pkg:deb/debian/openafs@1.6.20-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.6.20-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2016-9772"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dqvc-h6tg-nycg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70428?format=json","vulnerability_id":"VCID-e2vs-kppq-zff6","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-17432","reference_id":"","reference_type":"","scores":[{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79285","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79268","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79153","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79159","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79184","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.7917","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79195","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79203","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79227","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79212","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79229","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79226","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79228","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01235","scoring_system":"epss","scoring_elements":"0.79262","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-17432"},{"reference_url":"https://bugs.debian.org/883602","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.debian.org/883602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17432","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17432"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00016.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2017/12/msg00016.html"},{"reference_url":"https://www.debian.org/security/2017/dsa-4067","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2017/dsa-4067"},{"reference_url":"https://www.openafs.org/pages/security/OPENAFS-SA-2017-001.txt","reference_id":"","reference_type":"","scores":[],"url":"https://www.openafs.org/pages/security/OPENAFS-SA-2017-001.txt"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883602","reference_id":"883602","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883602"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-17432","reference_id":"CVE-2017-17432","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:C"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-17432"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933440?format=json","purl":"pkg:deb/debian/openafs@1.6.22-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.6.22-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2017-17432"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e2vs-kppq-zff6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31743?format=json","vulnerability_id":"VCID-etju-8ev7-a7e2","summary":"Multiple vulnerabilities have been found in OpenAFS, worst of which\n    can allow attackers to execute arbitrary code","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4134","reference_id":"","reference_type":"","scores":[{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35774","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35969","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35998","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35829","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35879","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35902","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35908","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35866","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35843","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35882","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.3587","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35821","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35587","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35556","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35469","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4134","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4134"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4135","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4135"},{"reference_url":"https://security.gentoo.org/glsa/201404-05","reference_id":"GLSA-201404-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201404-05"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933432?format=json","purl":"pkg:deb/debian/openafs@1.6.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.6.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2013-4134"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-etju-8ev7-a7e2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74706?format=json","vulnerability_id":"VCID-fyf1-fg12-z7hz","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16949","reference_id":"","reference_type":"","scores":[{"value":"0.04608","scoring_system":"epss","scoring_elements":"0.89207","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04608","scoring_system":"epss","scoring_elements":"0.89213","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04608","scoring_system":"epss","scoring_elements":"0.89228","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04608","scoring_system":"epss","scoring_elements":"0.8923","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04608","scoring_system":"epss","scoring_elements":"0.89248","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04608","scoring_system":"epss","scoring_elements":"0.89253","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04608","scoring_system":"epss","scoring_elements":"0.89262","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04608","scoring_system":"epss","scoring_elements":"0.89258","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04608","scoring_system":"epss","scoring_elements":"0.89255","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04608","scoring_system":"epss","scoring_elements":"0.89268","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04608","scoring_system":"epss","scoring_elements":"0.89263","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04608","scoring_system":"epss","scoring_elements":"0.89281","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04608","scoring_system":"epss","scoring_elements":"0.89286","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04608","scoring_system":"epss","scoring_elements":"0.89289","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16949"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16949"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908616","reference_id":"908616","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908616"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933441?format=json","purl":"pkg:deb/debian/openafs@1.8.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2018-16949"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fyf1-fg12-z7hz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/154771?format=json","vulnerability_id":"VCID-jkrm-yntd-t7dh","summary":"Buffer overflow in the Solaris kernel extension in OpenAFS before 1.6.13 allows local users to cause a denial of service (panic or deadlock) or possibly have other unspecified impact via a large group list when joining a PAG.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3286","reference_id":"","reference_type":"","scores":[{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21183","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21335","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.2139","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21143","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21223","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21285","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21295","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21255","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21201","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21193","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21203","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.2118","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21053","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21056","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00069","scoring_system":"epss","scoring_elements":"0.21031","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3286"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933436?format=json","purl":"pkg:deb/debian/openafs@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2015-3286"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jkrm-yntd-t7dh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61729?format=json","vulnerability_id":"VCID-ks47-edrs-xbc3","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7763","reference_id":"","reference_type":"","scores":[{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.6469","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64549","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64603","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64631","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64589","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64638","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64654","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64671","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64658","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.6463","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64666","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64677","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64663","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64683","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64695","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7763"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7763"},{"reference_url":"https://lists.openafs.org/pipermail/openafs-announce/2015/000493.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.openafs.org/pipermail/openafs-announce/2015/000493.html"},{"reference_url":"https://www.openafs.org/dl/openafs/1.6.15/RELNOTES-1.6.15","reference_id":"","reference_type":"","scores":[],"url":"https://www.openafs.org/dl/openafs/1.6.15/RELNOTES-1.6.15"},{"reference_url":"https://www.openafs.org/pages/security/OPENAFS-SA-2015-007.txt","reference_id":"","reference_type":"","scores":[],"url":"https://www.openafs.org/pages/security/OPENAFS-SA-2015-007.txt"},{"reference_url":"http://www.debian.org/security/2015/dsa-3387","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3387"},{"reference_url":"http://www.securitytracker.com/id/1034039","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034039"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.75:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.75:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.75:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.76:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.76:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.76:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.77:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.77:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.77:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.78:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.5.78:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.5.78:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.6.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.6.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.6.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.6.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.6.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.6.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.6.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.6.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.6.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.6.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.6.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.6.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.6.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.6.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.6.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.25:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.25:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.25:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.27:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.27:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.27:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7763","reference_id":"CVE-2015-7763","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7763"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933437?format=json","purl":"pkg:deb/debian/openafs@1.6.15-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.6.15-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2015-7763"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ks47-edrs-xbc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89879?format=json","vulnerability_id":"VCID-mrha-gp2j-vkf7","summary":"security flaw","references":[{"reference_url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-055.0.txt","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-055.0.txt"},{"reference_url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-011.txt.asc","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-011.txt.asc"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20020801-01-A","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"ftp://patches.sgi.com/support/free/security/advisories/20020801-01-A"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20020801-01-P","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"ftp://patches.sgi.com/support/free/security/advisories/20020801-01-P"},{"reference_url":"http://archives.neohapsis.com/archives/aix/2002-q4/0002.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://archives.neohapsis.com/archives/aix/2002-q4/0002.html"},{"reference_url":"http://archives.neohapsis.com/archives/bugtraq/2002-07/0514.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://archives.neohapsis.com/archives/bugtraq/2002-07/0514.html"},{"reference_url":"http://archives.neohapsis.com/archives/hp/2002-q3/0077.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://archives.neohapsis.com/archives/hp/2002-q3/0077.html"},{"reference_url":"http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20823","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://bvlive01.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=20823"},{"reference_url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000515","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000515"},{"reference_url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000535","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000535"},{"reference_url":"http://marc.info/?l=bugtraq&m=102813809232532&w=2","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://marc.info/?l=bugtraq&m=102813809232532&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=102821785316087&w=2","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://marc.info/?l=bugtraq&m=102821785316087&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=102821928418261&w=2","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://marc.info/?l=bugtraq&m=102821928418261&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=102831443208382&w=2","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://marc.info/?l=bugtraq&m=102831443208382&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=103158632831416&w=2","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://marc.info/?l=bugtraq&m=103158632831416&w=2"},{"reference_url":"http://online.securityfocus.com/advisories/4402","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://online.securityfocus.com/advisories/4402"},{"reference_url":"http://online.securityfocus.com/archive/1/285740","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://online.securityfocus.com/archive/1/285740"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2002-166.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2002-166.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2002-172.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2002-172.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0391.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2002-0391.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2002-0391","reference_id":"","reference_type":"","scores":[{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92246","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92198","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92205","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92211","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92214","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92225","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92229","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92234","published_at":"2026-04-11T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92235","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92232","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92244","published_at":"2026-04-16T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92243","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92245","published_at":"2026-04-21T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.92249","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08258","scoring_system":"epss","scoring_elements":"0.9225","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2002-0391"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0391","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0391"},{"reference_url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-057","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-057"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A42","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A42"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4728","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4728"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9"},{"reference_url":"http://www.cert.org/advisories/CA-2002-25.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.cert.org/advisories/CA-2002-25.html"},{"reference_url":"http://www.debian.org/security/2002/dsa-142","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.debian.org/security/2002/dsa-142"},{"reference_url":"http://www.debian.org/security/2002/dsa-143","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.debian.org/security/2002/dsa-143"},{"reference_url":"http://www.debian.org/security/2002/dsa-146","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.debian.org/security/2002/dsa-146"},{"reference_url":"http://www.debian.org/security/2002/dsa-149","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.debian.org/security/2002/dsa-149"},{"reference_url":"http://www.debian.org/security/2003/dsa-333","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.debian.org/security/2003/dsa-333"},{"reference_url":"http://www.iss.net/security_center/static/9170.php","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.iss.net/security_center/static/9170.php"},{"reference_url":"http://www.kb.cert.org/vuls/id/192995","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.kb.cert.org/vuls/id/192995"},{"reference_url":"http://www.linuxsecurity.com/advisories/other_advisory-2399.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.linuxsecurity.com/advisories/other_advisory-2399.html"},{"reference_url":"http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:057","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.mandrakesoft.com/security/advisories?name=MDKSA-2002:057"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2002-167.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.redhat.com/support/errata/RHSA-2002-167.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2002-173.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.redhat.com/support/errata/RHSA-2002-173.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2003-168.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.redhat.com/support/errata/RHSA-2003-168.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2003-212.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.redhat.com/support/errata/RHSA-2003-212.html"},{"reference_url":"http://www.securityfocus.com/bid/5356","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-02-08T19:26:07Z/"}],"url":"http://www.securityfocus.com/bid/5356"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616771","reference_id":"1616771","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616771"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:openbsd:openbsd:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:solaris:9.0:*:*:*:*:sparc:*:*","reference_id":"cpe:2.3:o:sun:solaris:9.0:*:*:*:*:sparc:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:solaris:9.0:*:*:*:*:sparc:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2002-0391","reference_id":"CVE-2002-0391","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2002-0391"},{"reference_url":"https://access.redhat.com/errata/RHSA-2002:166","reference_id":"RHSA-2002:166","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2002:166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2002:167","reference_id":"RHSA-2002:167","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2002:167"},{"reference_url":"https://access.redhat.com/errata/RHSA-2002:172","reference_id":"RHSA-2002:172","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2002:172"},{"reference_url":"https://access.redhat.com/errata/RHSA-2002:173","reference_id":"RHSA-2002:173","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2002:173"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:168","reference_id":"RHSA-2003:168","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:168"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:212","reference_id":"RHSA-2003:212","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:212"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933423?format=json","purl":"pkg:deb/debian/openafs@1.2.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.2.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2002-0391"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mrha-gp2j-vkf7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61689?format=json","vulnerability_id":"VCID-pddd-2ke7-afhu","summary":"A Denial of Service vulnerability has been discovered in OpenAFS.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6599","reference_id":"","reference_type":"","scores":[{"value":"0.01514","scoring_system":"epss","scoring_elements":"0.81154","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01514","scoring_system":"epss","scoring_elements":"0.81162","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01514","scoring_system":"epss","scoring_elements":"0.81187","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01514","scoring_system":"epss","scoring_elements":"0.81186","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01514","scoring_system":"epss","scoring_elements":"0.81213","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01514","scoring_system":"epss","scoring_elements":"0.81219","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01514","scoring_system":"epss","scoring_elements":"0.8124","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01514","scoring_system":"epss","scoring_elements":"0.81226","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01514","scoring_system":"epss","scoring_elements":"0.81218","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01514","scoring_system":"epss","scoring_elements":"0.81255","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01514","scoring_system":"epss","scoring_elements":"0.81257","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01514","scoring_system":"epss","scoring_elements":"0.81278","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01514","scoring_system":"epss","scoring_elements":"0.81286","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01514","scoring_system":"epss","scoring_elements":"0.81291","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6599"},{"reference_url":"https://security.gentoo.org/glsa/200801-04","reference_id":"GLSA-200801-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200801-04"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933428?format=json","purl":"pkg:deb/debian/openafs@1.4.6.dfsg1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.4.6.dfsg1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2007-6599"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pddd-2ke7-afhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56016?format=json","vulnerability_id":"VCID-rdz6-x3c4-tqhv","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0159","reference_id":"","reference_type":"","scores":[{"value":"0.01389","scoring_system":"epss","scoring_elements":"0.80289","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01389","scoring_system":"epss","scoring_elements":"0.80296","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01389","scoring_system":"epss","scoring_elements":"0.80316","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01389","scoring_system":"epss","scoring_elements":"0.80304","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01389","scoring_system":"epss","scoring_elements":"0.80333","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01389","scoring_system":"epss","scoring_elements":"0.80343","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01389","scoring_system":"epss","scoring_elements":"0.80362","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01389","scoring_system":"epss","scoring_elements":"0.80347","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01389","scoring_system":"epss","scoring_elements":"0.80341","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01389","scoring_system":"epss","scoring_elements":"0.8037","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01389","scoring_system":"epss","scoring_elements":"0.80372","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01389","scoring_system":"epss","scoring_elements":"0.80377","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01389","scoring_system":"epss","scoring_elements":"0.80403","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01389","scoring_system":"epss","scoring_elements":"0.80409","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01389","scoring_system":"epss","scoring_elements":"0.80427","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0159","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2852"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933433?format=json","purl":"pkg:deb/debian/openafs@1.6.7-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.6.7-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2014-0159"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rdz6-x3c4-tqhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/94088?format=json","vulnerability_id":"VCID-tf8j-e36c-syf8","summary":"OpenAFS before 1.6.24 and 1.8.x before 1.8.5 is prone to information leakage upon certain error conditions because uninitialized RPC output variables are sent over the network to a peer.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-18603","reference_id":"","reference_type":"","scores":[{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61507","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61512","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61356","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61433","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61461","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61432","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61479","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61494","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61515","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61502","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61482","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61521","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61525","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.6151","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00413","scoring_system":"epss","scoring_elements":"0.61496","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-18603"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18603","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18603"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/11/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/11/msg00002.html"},{"reference_url":"https://openafs.org/pages/security/OPENAFS-SA-2019-001.txt","reference_id":"","reference_type":"","scores":[],"url":"https://openafs.org/pages/security/OPENAFS-SA-2019-001.txt"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=943587","reference_id":"943587","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=943587"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-18603","reference_id":"CVE-2019-18603","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-18603"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933442?format=json","purl":"pkg:deb/debian/openafs@1.8.5-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.5-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2019-18603"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tf8j-e36c-syf8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56017?format=json","vulnerability_id":"VCID-tudy-8pkq-cbe4","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2852","reference_id":"","reference_type":"","scores":[{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64663","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64715","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64743","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64701","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64749","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64763","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64781","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64769","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64741","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64779","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64789","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64776","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64794","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64806","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00474","scoring_system":"epss","scoring_elements":"0.64803","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-2852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0159","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2852"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933433?format=json","purl":"pkg:deb/debian/openafs@1.6.7-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.6.7-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2014-2852"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tudy-8pkq-cbe4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74705?format=json","vulnerability_id":"VCID-u141-pmrt-t3e9","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16948","reference_id":"","reference_type":"","scores":[{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57826","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.5793","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57906","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57961","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57963","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57979","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57956","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57936","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57966","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57964","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57942","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57905","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57921","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57904","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16949"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908616","reference_id":"908616","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908616"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933441?format=json","purl":"pkg:deb/debian/openafs@1.8.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2018-16948"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u141-pmrt-t3e9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81084?format=json","vulnerability_id":"VCID-u8f1-fg77-efhc","summary":"security update","references":[{"reference_url":"http://git.openafs.org/?p=openafs.git%3Ba=commitdiff%3Bh=396240cf070a806b91fea81131d034e1399af1e0","reference_id":"","reference_type":"","scores":[],"url":"http://git.openafs.org/?p=openafs.git%3Ba=commitdiff%3Bh=396240cf070a806b91fea81131d034e1399af1e0"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2860","reference_id":"","reference_type":"","scores":[{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48499","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48541","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48486","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48521","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48544","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48496","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48551","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48546","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48567","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.4854","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48553","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48603","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48599","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00252","scoring_system":"epss","scoring_elements":"0.48557","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2860"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2860"},{"reference_url":"https://lists.openafs.org/pipermail/openafs-announce/2016/000496.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.openafs.org/pipermail/openafs-announce/2016/000496.html"},{"reference_url":"https://www.openafs.org/dl/openafs/1.6.17/RELNOTES-1.6.17","reference_id":"","reference_type":"","scores":[],"url":"https://www.openafs.org/dl/openafs/1.6.17/RELNOTES-1.6.17"},{"reference_url":"http://www.debian.org/security/2016/dsa-3569","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3569"},{"reference_url":"http://www.openafs.org/pages/security/OPENAFS-SA-2016-001.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.openafs.org/pages/security/OPENAFS-SA-2016-001.txt"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2860","reference_id":"CVE-2016-2860","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:N/I:P/A:N"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2860"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933438?format=json","purl":"pkg:deb/debian/openafs@1.6.17-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.6.17-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2016-2860"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u8f1-fg77-efhc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81083?format=json","vulnerability_id":"VCID-uvnq-mwb3-8ub9","summary":"security update","references":[{"reference_url":"http://git.openafs.org/?p=openafs.git%3Ba=commitdiff%3Bh=2ef863720da4d9f368aaca0461c672a3008195ca","reference_id":"","reference_type":"","scores":[],"url":"http://git.openafs.org/?p=openafs.git%3Ba=commitdiff%3Bh=2ef863720da4d9f368aaca0461c672a3008195ca"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8312","reference_id":"","reference_type":"","scores":[{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.11944","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12041","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12078","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12188","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12234","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12035","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12117","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12168","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12176","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12139","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12108","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.11978","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.11975","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12093","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12073","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-8312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8312","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8312"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2860","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2860"},{"reference_url":"https://www.openafs.org/dl/1.6.16/RELNOTES-1.6.16","reference_id":"","reference_type":"","scores":[],"url":"https://www.openafs.org/dl/1.6.16/RELNOTES-1.6.16"},{"reference_url":"http://www.debian.org/security/2016/dsa-3569","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3569"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8312","reference_id":"CVE-2015-8312","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-8312"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933438?format=json","purl":"pkg:deb/debian/openafs@1.6.17-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.6.17-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2015-8312"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uvnq-mwb3-8ub9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60376?format=json","vulnerability_id":"VCID-w6k1-2px5-97gj","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-6587","reference_id":"","reference_type":"","scores":[{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70108","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.7012","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70135","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70112","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70159","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70175","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70199","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70184","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70172","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70214","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70223","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70202","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70254","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70261","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.7026","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-6587"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3282","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3285","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3285"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6587"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933435?format=json","purl":"pkg:deb/debian/openafs@1.6.13-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.6.13-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2015-6587"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w6k1-2px5-97gj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61728?format=json","vulnerability_id":"VCID-y9rq-rewv-2qd8","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7762","reference_id":"","reference_type":"","scores":[{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.6469","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64549","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64603","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64631","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64589","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64638","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64654","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64671","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64658","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.6463","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64666","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64677","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64663","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64683","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00472","scoring_system":"epss","scoring_elements":"0.64695","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7762","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7762"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7763","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7763"},{"reference_url":"https://lists.openafs.org/pipermail/openafs-announce/2015/000493.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.openafs.org/pipermail/openafs-announce/2015/000493.html"},{"reference_url":"https://www.openafs.org/dl/openafs/1.6.15/RELNOTES-1.6.15","reference_id":"","reference_type":"","scores":[],"url":"https://www.openafs.org/dl/openafs/1.6.15/RELNOTES-1.6.15"},{"reference_url":"https://www.openafs.org/pages/security/OPENAFS-SA-2015-007.txt","reference_id":"","reference_type":"","scores":[],"url":"https://www.openafs.org/pages/security/OPENAFS-SA-2015-007.txt"},{"reference_url":"http://www.debian.org/security/2015/dsa-3387","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2015/dsa-3387"},{"reference_url":"http://www.securitytracker.com/id/1034039","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1034039"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.25:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.25:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.25:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.26:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.26:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.26:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.27:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.27:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.27:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.28:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.28:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.28:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.29:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.29:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.29:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openafs:openafs:1.7.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openafs:openafs:1.7.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7762","reference_id":"CVE-2015-7762","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7762"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933437?format=json","purl":"pkg:deb/debian/openafs@1.6.15-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.6.15-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2015-7762"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y9rq-rewv-2qd8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60375?format=json","vulnerability_id":"VCID-zab2-z21w-1qde","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3285","reference_id":"","reference_type":"","scores":[{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23758","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23875","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23915","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23704","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23774","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23822","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23836","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23792","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23735","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23745","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23733","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23711","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.236","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.2359","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23555","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3285"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3282","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3282"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3285","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3285"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6587","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6587"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933435?format=json","purl":"pkg:deb/debian/openafs@1.6.13-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.6.13-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2015-3285"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zab2-z21w-1qde"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74704?format=json","vulnerability_id":"VCID-zsd8-ykp1-4ke9","summary":"security update","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16947","reference_id":"","reference_type":"","scores":[{"value":"0.01486","scoring_system":"epss","scoring_elements":"0.80965","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01486","scoring_system":"epss","scoring_elements":"0.80974","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01486","scoring_system":"epss","scoring_elements":"0.80998","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01486","scoring_system":"epss","scoring_elements":"0.80996","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01486","scoring_system":"epss","scoring_elements":"0.81025","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01486","scoring_system":"epss","scoring_elements":"0.81031","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01486","scoring_system":"epss","scoring_elements":"0.81049","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01486","scoring_system":"epss","scoring_elements":"0.81035","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01486","scoring_system":"epss","scoring_elements":"0.81028","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01486","scoring_system":"epss","scoring_elements":"0.81065","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01486","scoring_system":"epss","scoring_elements":"0.81066","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01486","scoring_system":"epss","scoring_elements":"0.81064","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01486","scoring_system":"epss","scoring_elements":"0.81087","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01486","scoring_system":"epss","scoring_elements":"0.81095","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01486","scoring_system":"epss","scoring_elements":"0.81103","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-16947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16948","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16948"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16949","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16949"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908616","reference_id":"908616","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=908616"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/933441?format=json","purl":"pkg:deb/debian/openafs@1.8.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933424?format=json","purl":"pkg:deb/debian/openafs@1.8.6-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.6-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933422?format=json","purl":"pkg:deb/debian/openafs@1.8.9-1%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.9-1%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933426?format=json","purl":"pkg:deb/debian/openafs@1.8.13.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/933425?format=json","purl":"pkg:deb/debian/openafs@1.8.14-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.14-1%3Fdistro=trixie"}],"aliases":["CVE-2018-16947"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zsd8-ykp1-4ke9"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/openafs@1.8.13.2-1%3Fdistro=trixie"}