{"url":"http://public2.vulnerablecode.io/api/packages/93441?format=json","purl":"pkg:rpm/redhat/glibc@2.28-151.el8_4?arch=2","type":"rpm","namespace":"redhat","name":"glibc","version":"2.28-151.el8_4","qualifiers":{"arch":"2"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43040?format=json","vulnerability_id":"VCID-3hqs-jns2-puf2","summary":"Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33599.json","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33599.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33599","reference_id":"","reference_type":"","scores":[{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70094","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70102","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70116","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70141","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70157","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.7018","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70165","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70153","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70196","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00624","scoring_system":"epss","scoring_elements":"0.70205","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0087","scoring_system":"epss","scoring_elements":"0.75216","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0087","scoring_system":"epss","scoring_elements":"0.75253","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0087","scoring_system":"epss","scoring_elements":"0.75256","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0087","scoring_system":"epss","scoring_elements":"0.7526","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277202","reference_id":"2277202","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277202"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/07/22/5","reference_id":"5","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/07/22/5"},{"reference_url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005","reference_id":"GLIBC-SA-2024-0005","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/"}],"url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005"},{"reference_url":"https://security.gentoo.org/glsa/202405-17","reference_id":"GLSA-202405-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-17"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html","reference_id":"msg00026.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240524-0011/","reference_id":"ntap-20240524-0011","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-29T19:01:02Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240524-0011/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2799","reference_id":"RHSA-2024:2799","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2799"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3309","reference_id":"RHSA-2024:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3312","reference_id":"RHSA-2024:3312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3339","reference_id":"RHSA-2024:3339","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3339"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3344","reference_id":"RHSA-2024:3344","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3411","reference_id":"RHSA-2024:3411","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3411"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3423","reference_id":"RHSA-2024:3423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3464","reference_id":"RHSA-2024:3464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3588","reference_id":"RHSA-2024:3588","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4126","reference_id":"RHSA-2024:4126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4126"},{"reference_url":"https://usn.ubuntu.com/6804-1/","reference_id":"USN-6804-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6804-1/"}],"fixed_packages":[],"aliases":["CVE-2024-33599"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3hqs-jns2-puf2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43041?format=json","vulnerability_id":"VCID-bcuy-bbxf-x7hy","summary":"Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33600.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33600.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33600","reference_id":"","reference_type":"","scores":[{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45242","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.4522","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45185","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.4524","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45261","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45229","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45231","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45282","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00225","scoring_system":"epss","scoring_elements":"0.45276","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54534","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54576","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.5454","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00314","scoring_system":"epss","scoring_elements":"0.54555","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277204","reference_id":"2277204","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277204"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/07/22/5","reference_id":"5","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/07/22/5"},{"reference_url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0006","reference_id":"GLIBC-SA-2024-0006","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/"}],"url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0006"},{"reference_url":"https://security.gentoo.org/glsa/202405-17","reference_id":"GLSA-202405-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-17"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html","reference_id":"msg00026.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240524-0013/","reference_id":"ntap-20240524-0013","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T19:13:16Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240524-0013/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2799","reference_id":"RHSA-2024:2799","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2799"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3309","reference_id":"RHSA-2024:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3312","reference_id":"RHSA-2024:3312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3339","reference_id":"RHSA-2024:3339","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3339"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3344","reference_id":"RHSA-2024:3344","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3411","reference_id":"RHSA-2024:3411","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3411"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3423","reference_id":"RHSA-2024:3423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3464","reference_id":"RHSA-2024:3464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3588","reference_id":"RHSA-2024:3588","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4126","reference_id":"RHSA-2024:4126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4126"},{"reference_url":"https://usn.ubuntu.com/6804-1/","reference_id":"USN-6804-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6804-1/"}],"fixed_packages":[],"aliases":["CVE-2024-33600"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bcuy-bbxf-x7hy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43042?format=json","vulnerability_id":"VCID-bsue-bznw-1ffe","summary":"Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33601.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33601.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33601","reference_id":"","reference_type":"","scores":[{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28367","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28523","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28566","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28433","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28476","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28479","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28436","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28387","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28401","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28379","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34852","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34618","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34598","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.3451","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277205","reference_id":"2277205","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277205"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/07/22/5","reference_id":"5","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/07/22/5"},{"reference_url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007","reference_id":"GLIBC-SA-2024-0007","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/"}],"url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007"},{"reference_url":"https://security.gentoo.org/glsa/202405-17","reference_id":"GLSA-202405-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-17"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html","reference_id":"msg00026.html","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240524-0014/","reference_id":"ntap-20240524-0014","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-05-09T17:26:01Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240524-0014/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2799","reference_id":"RHSA-2024:2799","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2799"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3309","reference_id":"RHSA-2024:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3312","reference_id":"RHSA-2024:3312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3339","reference_id":"RHSA-2024:3339","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3339"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3344","reference_id":"RHSA-2024:3344","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3411","reference_id":"RHSA-2024:3411","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3411"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3423","reference_id":"RHSA-2024:3423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3464","reference_id":"RHSA-2024:3464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3588","reference_id":"RHSA-2024:3588","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4126","reference_id":"RHSA-2024:4126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4126"},{"reference_url":"https://usn.ubuntu.com/6804-1/","reference_id":"USN-6804-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6804-1/"}],"fixed_packages":[],"aliases":["CVE-2024-33601"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bsue-bznw-1ffe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43039?format=json","vulnerability_id":"VCID-sjav-8bub-eycz","summary":"Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2961.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2961.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2961","reference_id":"","reference_type":"","scores":[{"value":"0.91755","scoring_system":"epss","scoring_elements":"0.99689","published_at":"2026-04-21T12:55:00Z"},{"value":"0.91924","scoring_system":"epss","scoring_elements":"0.99701","published_at":"2026-04-29T12:55:00Z"},{"value":"0.91924","scoring_system":"epss","scoring_elements":"0.997","published_at":"2026-04-24T12:55:00Z"},{"value":"0.92156","scoring_system":"epss","scoring_elements":"0.9971","published_at":"2026-04-13T12:55:00Z"},{"value":"0.92156","scoring_system":"epss","scoring_elements":"0.99712","published_at":"2026-04-18T12:55:00Z"},{"value":"0.92156","scoring_system":"epss","scoring_elements":"0.99711","published_at":"2026-04-16T12:55:00Z"},{"value":"0.92156","scoring_system":"epss","scoring_elements":"0.99709","published_at":"2026-04-09T12:55:00Z"},{"value":"0.92156","scoring_system":"epss","scoring_elements":"0.99707","published_at":"2026-04-04T12:55:00Z"},{"value":"0.92578","scoring_system":"epss","scoring_elements":"0.99739","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2961"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/05/27/1","reference_id":"1","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/05/27/1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069191","reference_id":"1069191","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1069191"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/04/24/2","reference_id":"2","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/04/24/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/05/27/2","reference_id":"2","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/05/27/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273404","reference_id":"2273404","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2273404"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/05/27/3","reference_id":"3","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/05/27/3"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/04/18/4","reference_id":"4","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/04/18/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/05/27/4","reference_id":"4","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/05/27/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/05/27/5","reference_id":"5","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/05/27/5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/07/22/5","reference_id":"5","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/07/22/5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/05/27/6","reference_id":"6","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/05/27/6"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/04/17/9","reference_id":"9","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/04/17/9"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/","reference_id":"BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/"},{"reference_url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004","reference_id":"GLIBC-SA-2024-0004","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004"},{"reference_url":"https://security.gentoo.org/glsa/202405-17","reference_id":"GLSA-202405-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-17"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html","reference_id":"msg00001.html","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240531-0002/","reference_id":"ntap-20240531-0002","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240531-0002/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/","reference_id":"P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2722","reference_id":"RHSA-2024:2722","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2722"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2799","reference_id":"RHSA-2024:2799","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2799"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3269","reference_id":"RHSA-2024:3269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3309","reference_id":"RHSA-2024:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3312","reference_id":"RHSA-2024:3312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3339","reference_id":"RHSA-2024:3339","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3339"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3411","reference_id":"RHSA-2024:3411","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3411"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3423","reference_id":"RHSA-2024:3423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3464","reference_id":"RHSA-2024:3464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3588","reference_id":"RHSA-2024:3588","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4126","reference_id":"RHSA-2024:4126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7590","reference_id":"RHSA-2024:7590","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7590"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7594","reference_id":"RHSA-2024:7594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7599","reference_id":"RHSA-2024:7599","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7599"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:7939","reference_id":"RHSA-2024:7939","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:7939"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8235","reference_id":"RHSA-2024:8235","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8235"},{"reference_url":"https://usn.ubuntu.com/6737-1/","reference_id":"USN-6737-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6737-1/"},{"reference_url":"https://usn.ubuntu.com/6737-2/","reference_id":"USN-6737-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6737-2/"},{"reference_url":"https://usn.ubuntu.com/6762-1/","reference_id":"USN-6762-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6762-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/","reference_id":"YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-30T04:00:23Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/"}],"fixed_packages":[],"aliases":["CVE-2024-2961"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sjav-8bub-eycz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/43043?format=json","vulnerability_id":"VCID-xhcm-t8jb-ybfb","summary":"Multiple vulnerabilities have been discovered in glibc, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33602.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-33602.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33602","reference_id":"","reference_type":"","scores":[{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63592","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63607","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63633","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63644","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63661","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63676","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.6366","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63627","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63664","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63673","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.70258","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.70311","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.70319","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00627","scoring_system":"epss","scoring_elements":"0.70316","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-33602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277206","reference_id":"2277206","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277206"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/07/22/5","reference_id":"5","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/07/22/5"},{"reference_url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0008","reference_id":"GLIBC-SA-2024-0008","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/"}],"url":"https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0008"},{"reference_url":"https://security.gentoo.org/glsa/202405-17","reference_id":"GLSA-202405-17","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-17"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html","reference_id":"msg00026.html","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240524-0012/","reference_id":"ntap-20240524-0012","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-13T16:09:29Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240524-0012/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2799","reference_id":"RHSA-2024:2799","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2799"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3309","reference_id":"RHSA-2024:3309","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3309"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3312","reference_id":"RHSA-2024:3312","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3312"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3339","reference_id":"RHSA-2024:3339","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3339"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3344","reference_id":"RHSA-2024:3344","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3344"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3411","reference_id":"RHSA-2024:3411","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3411"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3423","reference_id":"RHSA-2024:3423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3464","reference_id":"RHSA-2024:3464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:3588","reference_id":"RHSA-2024:3588","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:3588"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:4126","reference_id":"RHSA-2024:4126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:4126"},{"reference_url":"https://usn.ubuntu.com/6804-1/","reference_id":"USN-6804-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6804-1/"}],"fixed_packages":[],"aliases":["CVE-2024-33602"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xhcm-t8jb-ybfb"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/glibc@2.28-151.el8_4%3Farch=2"}