{"url":"http://public2.vulnerablecode.io/api/packages/941945?format=json","purl":"pkg:deb/debian/util-linux@2.42-1?distro=trixie","type":"deb","namespace":"debian","name":"util-linux","version":"2.42-1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.42-2","latest_non_vulnerable_version":"2.42-5","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85030?format=json","vulnerability_id":"VCID-3dyt-qa2a-rke1","summary":"util-linux: Extended partition loop in MBR partition table leads to DOS","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2605.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2605.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5011.json","reference_id":"","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5011.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5011","reference_id":"","reference_type":"","scores":[{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34509","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34285","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34624","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34387","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34369","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34727","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34753","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34631","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34674","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34702","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34706","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34667","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34643","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.3468","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34665","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-5011"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5011","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5011"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/commit/?id=7164a1c3","reference_id":"","reference_type":"","scores":[],"url":"https://git.kernel.org/pub/scm/utils/util-linux/util-linux.git/commit/?id=7164a1c3"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024543","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=isg3T1024543"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=nas8N1021801","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=nas8N1021801"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/07/11/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/07/11/2"},{"reference_url":"http://www.securityfocus.com/bid/91683","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/91683"},{"reference_url":"http://www.securitytracker.com/id/1036272","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036272"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1349741","reference_id":"1349741","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1349741"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830802","reference_id":"830802","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=830802"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:power_hardware_management_console:8.8.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:power_hardware_management_console:8.8.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:power_hardware_management_console:8.8.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:powerkvm:3.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5011","reference_id":"CVE-2016-5011","reference_type":"","scores":[{"value":"4.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:C"},{"value":"4.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-5011"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2605","reference_id":"RHSA-2016:2605","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2605"},{"reference_url":"https://usn.ubuntu.com/5478-1/","reference_id":"USN-5478-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5478-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941957?format=json","purl":"pkg:deb/debian/util-linux@2.28.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.28.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941943?format=json","purl":"pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941941?format=json","purl":"pkg:deb/debian/util-linux@2.38.1-5%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.38.1-5%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941946?format=json","purl":"pkg:deb/debian/util-linux@2.41-5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941944?format=json","purl":"pkg:deb/debian/util-linux@2.41.3-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41.3-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941945?format=json","purl":"pkg:deb/debian/util-linux@2.42-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1059664?format=json","purl":"pkg:deb/debian/util-linux@2.42-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062547?format=json","purl":"pkg:deb/debian/util-linux@2.42-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072664?format=json","purl":"pkg:deb/debian/util-linux@2.42-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081585?format=json","purl":"pkg:deb/debian/util-linux@2.42-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-5%3Fdistro=trixie"}],"aliases":["CVE-2016-5011"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3dyt-qa2a-rke1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/77137?format=json","vulnerability_id":"VCID-3pq5-w4nm-dkec","summary":"util-linux: CVE-2024-28085: wall: escape sequence injection","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28085.json","reference_id":"","reference_type":"","scores":[{"value":"4.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28085.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-28085","reference_id":"","reference_type":"","scores":[{"value":"0.10177","scoring_system":"epss","scoring_elements":"0.93153","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10177","scoring_system":"epss","scoring_elements":"0.9315","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10177","scoring_system":"epss","scoring_elements":"0.93148","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10177","scoring_system":"epss","scoring_elements":"0.93154","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10933","scoring_system":"epss","scoring_elements":"0.93425","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10933","scoring_system":"epss","scoring_elements":"0.9342","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11188","scoring_system":"epss","scoring_elements":"0.9347","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11188","scoring_system":"epss","scoring_elements":"0.93494","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11188","scoring_system":"epss","scoring_elements":"0.93493","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11188","scoring_system":"epss","scoring_elements":"0.93485","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11188","scoring_system":"epss","scoring_elements":"0.93477","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11188","scoring_system":"epss","scoring_elements":"0.93488","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-28085"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28085","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28085"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/28/1","reference_id":"1","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/28/1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067849","reference_id":"1067849","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067849"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/28/2","reference_id":"2","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/28/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271942","reference_id":"2271942","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271942"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/28/3","reference_id":"3","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/28/3"},{"reference_url":"https://www.openwall.com/lists/oss-security/2024/03/27/5","reference_id":"5","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"https://www.openwall.com/lists/oss-security/2024/03/27/5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/27/5","reference_id":"5","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/27/5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/27/6","reference_id":"6","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/27/6"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/27/7","reference_id":"7","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/27/7"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/27/8","reference_id":"8","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/27/8"},{"reference_url":"http://www.openwall.com/lists/oss-security/2024/03/27/9","reference_id":"9","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"http://www.openwall.com/lists/oss-security/2024/03/27/9"},{"reference_url":"https://github.com/skyler-ferrante/CVE-2024-28085","reference_id":"CVE-2024-28085","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"https://github.com/skyler-ferrante/CVE-2024-28085"},{"reference_url":"https://github.com/util-linux/util-linux/security/advisories/GHSA-xv2h-c6ww-mrjq","reference_id":"GHSA-xv2h-c6ww-mrjq","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"https://github.com/util-linux/util-linux/security/advisories/GHSA-xv2h-c6ww-mrjq"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00005.html","reference_id":"msg00005.html","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2024/04/msg00005.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20240531-0003/","reference_id":"ntap-20240531-0003","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"https://security.netapp.com/advisory/ntap-20240531-0003/"},{"reference_url":"https://usn.ubuntu.com/6719-1/","reference_id":"USN-6719-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6719-1/"},{"reference_url":"https://usn.ubuntu.com/6719-2/","reference_id":"USN-6719-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6719-2/"},{"reference_url":"https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/","reference_id":"util-linux","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/"},{"reference_url":"https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt","reference_id":"wall_2_27_2024.txt","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-26T20:25:25Z/"}],"url":"https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941943?format=json","purl":"pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941963?format=json","purl":"pkg:deb/debian/util-linux@2.38.1-5%2Bdeb12u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.38.1-5%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941941?format=json","purl":"pkg:deb/debian/util-linux@2.38.1-5%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.38.1-5%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941964?format=json","purl":"pkg:deb/debian/util-linux@2.39.3-11?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.39.3-11%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941946?format=json","purl":"pkg:deb/debian/util-linux@2.41-5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941944?format=json","purl":"pkg:deb/debian/util-linux@2.41.3-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41.3-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941945?format=json","purl":"pkg:deb/debian/util-linux@2.42-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1059664?format=json","purl":"pkg:deb/debian/util-linux@2.42-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062547?format=json","purl":"pkg:deb/debian/util-linux@2.42-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072664?format=json","purl":"pkg:deb/debian/util-linux@2.42-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081585?format=json","purl":"pkg:deb/debian/util-linux@2.42-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-5%3Fdistro=trixie"}],"aliases":["CVE-2024-28085"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3pq5-w4nm-dkec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89998?format=json","vulnerability_id":"VCID-3q76-uf4t-5fgt","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2001-1494.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2001-1494.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2001-1494","reference_id":"","reference_type":"","scores":[{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23164","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23185","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23174","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23339","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23513","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23549","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23333","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23405","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23456","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23476","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23437","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23382","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.234","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23395","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00079","scoring_system":"epss","scoring_elements":"0.23376","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2001-1494"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1494","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1494"},{"reference_url":"http://seclists.org/bugtraq/2001/Dec/0122.html","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/bugtraq/2001/Dec/0122.html"},{"reference_url":"http://seclists.org/bugtraq/2001/Dec/0123.html","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/bugtraq/2001/Dec/0123.html"},{"reference_url":"http://secunia.com/advisories/16785","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/16785"},{"reference_url":"http://secunia.com/advisories/18502","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18502"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7718","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7718"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10723","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10723"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2006-014.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-014.htm"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-782.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-782.html"},{"reference_url":"http://www.securityfocus.com/bid/16280","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/16280"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616708","reference_id":"1616708","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1616708"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:cvlan:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:avaya:cvlan:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:cvlan:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:integrated_management_suit:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:avaya:integrated_management_suit:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:integrated_management_suit:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:interactive_response:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:avaya:interactive_response:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:interactive_response:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:intuity_lx:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:avaya:intuity_lx:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:intuity_lx:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:message_networking:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:avaya:message_networking:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:message_networking:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:messaging_storage_server:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:avaya:messaging_storage_server:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:avaya:messaging_storage_server:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2001-1494","reference_id":"CVE-2001-1494","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:P/A:N"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2001-1494"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:782","reference_id":"RHSA-2005:782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:782"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941942?format=json","purl":"pkg:deb/debian/util-linux@2.11n-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.11n-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941943?format=json","purl":"pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941941?format=json","purl":"pkg:deb/debian/util-linux@2.38.1-5%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.38.1-5%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941946?format=json","purl":"pkg:deb/debian/util-linux@2.41-5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941944?format=json","purl":"pkg:deb/debian/util-linux@2.41.3-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41.3-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941945?format=json","purl":"pkg:deb/debian/util-linux@2.42-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1059664?format=json","purl":"pkg:deb/debian/util-linux@2.42-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062547?format=json","purl":"pkg:deb/debian/util-linux@2.42-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072664?format=json","purl":"pkg:deb/debian/util-linux@2.42-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081585?format=json","purl":"pkg:deb/debian/util-linux@2.42-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-5%3Fdistro=trixie"}],"aliases":["CVE-2001-1494"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3q76-uf4t-5fgt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78161?format=json","vulnerability_id":"VCID-61nu-645a-dyhx","summary":"util-linux: arbitrary commands execution via the path parameter","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-21583.json","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-21583.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2020-21583","reference_id":"","reference_type":"","scores":[{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11321","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11458","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11214","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11378","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11319","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11276","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11517","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11304","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11387","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11445","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11449","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11416","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11249","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2020-21583"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21583","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-21583"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238716","reference_id":"2238716","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238716"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786804","reference_id":"bugreport.cgi?bug=786804","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-07T15:19:58Z/"}],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=786804"},{"reference_url":"https://packetstormsecurity.com/files/132061/hwclock-Privilege-Escalation.html","reference_id":"hwclock-Privilege-Escalation.html","reference_type":"","scores":[{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-10-07T15:19:58Z/"}],"url":"https://packetstormsecurity.com/files/132061/hwclock-Privilege-Escalation.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941955?format=json","purl":"pkg:deb/debian/util-linux@2.27-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.27-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941943?format=json","purl":"pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941941?format=json","purl":"pkg:deb/debian/util-linux@2.38.1-5%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.38.1-5%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941946?format=json","purl":"pkg:deb/debian/util-linux@2.41-5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941944?format=json","purl":"pkg:deb/debian/util-linux@2.41.3-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41.3-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941945?format=json","purl":"pkg:deb/debian/util-linux@2.42-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1059664?format=json","purl":"pkg:deb/debian/util-linux@2.42-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062547?format=json","purl":"pkg:deb/debian/util-linux@2.42-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072664?format=json","purl":"pkg:deb/debian/util-linux@2.42-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081585?format=json","purl":"pkg:deb/debian/util-linux@2.42-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-5%3Fdistro=trixie"}],"aliases":["CVE-2020-21583"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-61nu-645a-dyhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/90418?format=json","vulnerability_id":"VCID-69jr-4hyf-93gf","summary":"umount, when running with the Linux 2.6.15 kernel on Slackware Linux 10.2, allows local users to trigger a NULL dereference and application crash by invoking the program with a pathname for a USB pen drive that was mounted and then physically removed, which might allow the users to obtain sensitive information, including core file contents.","references":[{"reference_url":"http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0012.html","reference_id":"","reference_type":"","scores":[],"url":"http://archives.neohapsis.com/archives/fulldisclosure/2007-02/0012.html"},{"reference_url":"http://gotfault.wordpress.com/2007/01/18/umount-bug/","reference_id":"","reference_type":"","scores":[],"url":"http://gotfault.wordpress.com/2007/01/18/umount-bug/"},{"reference_url":"http://osvdb.org/33652","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/33652"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0822.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0822.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0822","reference_id":"","reference_type":"","scores":[{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19705","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19885","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.20032","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.2009","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19818","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19898","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19952","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19971","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19927","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19869","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19845","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.1985","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19848","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19744","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19735","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-0822"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:053","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:053"},{"reference_url":"http://www.securityfocus.com/bid/22850","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/22850"},{"reference_url":"http://www.securitytracker.com/id?1017729","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1017729"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0822","reference_id":"CVE-2007-0822","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-0822"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941949?format=json","purl":"pkg:deb/debian/util-linux@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941943?format=json","purl":"pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941941?format=json","purl":"pkg:deb/debian/util-linux@2.38.1-5%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.38.1-5%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941946?format=json","purl":"pkg:deb/debian/util-linux@2.41-5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941944?format=json","purl":"pkg:deb/debian/util-linux@2.41.3-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41.3-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941945?format=json","purl":"pkg:deb/debian/util-linux@2.42-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1059664?format=json","purl":"pkg:deb/debian/util-linux@2.42-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062547?format=json","purl":"pkg:deb/debian/util-linux@2.42-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072664?format=json","purl":"pkg:deb/debian/util-linux@2.42-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081585?format=json","purl":"pkg:deb/debian/util-linux@2.42-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-5%3Fdistro=trixie"}],"aliases":["CVE-2007-0822"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-69jr-4hyf-93gf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49128?format=json","vulnerability_id":"VCID-773t-t959-z3c1","summary":"Multiple vulnerabilities have been discovered in util-linux which can lead to denial of service or information disclosure.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3996.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3996.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3996","reference_id":"","reference_type":"","scores":[{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46141","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46101","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46161","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46165","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46162","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46185","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46157","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46166","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46223","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46219","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46163","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46144","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46152","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00233","scoring_system":"epss","scoring_elements":"0.46093","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3996"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/util-linux/util-linux/commit/166e87368ae88bf31112a30e078cceae637f4cdb","reference_id":"166e87368ae88bf31112a30e078cceae637f4cdb","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"}],"url":"https://github.com/util-linux/util-linux/commit/166e87368ae88bf31112a30e078cceae637f4cdb"},{"reference_url":"https://www.openwall.com/lists/oss-security/2022/01/24/2","reference_id":"2","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"}],"url":"https://www.openwall.com/lists/oss-security/2022/01/24/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/11/30/2","reference_id":"2","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/11/30/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024628","reference_id":"2024628","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024628"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Dec/4","reference_id":"4","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Dec/4"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2021-3996","reference_id":"CVE-2021-3996","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2021-3996"},{"reference_url":"https://security.gentoo.org/glsa/202401-08","reference_id":"GLSA-202401-08","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"}],"url":"https://security.gentoo.org/glsa/202401-08"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221209-0002/","reference_id":"ntap-20221209-0002","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221209-0002/"},{"reference_url":"http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html","reference_id":"snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"}],"url":"http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html"},{"reference_url":"https://usn.ubuntu.com/5279-1/","reference_id":"USN-5279-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5279-1/"},{"reference_url":"https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes","reference_id":"v2.37.3-ReleaseNotes","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-04T21:16:28Z/"}],"url":"https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941962?format=json","purl":"pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941943?format=json","purl":"pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941961?format=json","purl":"pkg:deb/debian/util-linux@2.37.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.37.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941941?format=json","purl":"pkg:deb/debian/util-linux@2.38.1-5%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.38.1-5%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941946?format=json","purl":"pkg:deb/debian/util-linux@2.41-5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941944?format=json","purl":"pkg:deb/debian/util-linux@2.41.3-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41.3-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941945?format=json","purl":"pkg:deb/debian/util-linux@2.42-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1059664?format=json","purl":"pkg:deb/debian/util-linux@2.42-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062547?format=json","purl":"pkg:deb/debian/util-linux@2.42-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072664?format=json","purl":"pkg:deb/debian/util-linux@2.42-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081585?format=json","purl":"pkg:deb/debian/util-linux@2.42-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-5%3Fdistro=trixie"}],"aliases":["CVE-2021-3996"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-773t-t959-z3c1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49129?format=json","vulnerability_id":"VCID-7ha4-8xxt-xkfy","summary":"Multiple vulnerabilities have been discovered in util-linux which can lead to denial of service or information disclosure.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37600.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-37600.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-37600","reference_id":"","reference_type":"","scores":[{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1705","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16879","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16946","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16929","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17224","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17274","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17055","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17145","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17202","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17177","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1713","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17069","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17006","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17009","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17046","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-37600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37600"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1987320","reference_id":"1987320","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1987320"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991619","reference_id":"991619","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991619"},{"reference_url":"https://security.archlinux.org/AVG-2236","reference_id":"AVG-2236","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2236"},{"reference_url":"https://security.gentoo.org/glsa/202401-08","reference_id":"GLSA-202401-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-08"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941960?format=json","purl":"pkg:deb/debian/util-linux@2.36.1-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941943?format=json","purl":"pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941941?format=json","purl":"pkg:deb/debian/util-linux@2.38.1-5%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.38.1-5%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941946?format=json","purl":"pkg:deb/debian/util-linux@2.41-5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941944?format=json","purl":"pkg:deb/debian/util-linux@2.41.3-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41.3-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941945?format=json","purl":"pkg:deb/debian/util-linux@2.42-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1059664?format=json","purl":"pkg:deb/debian/util-linux@2.42-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062547?format=json","purl":"pkg:deb/debian/util-linux@2.42-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072664?format=json","purl":"pkg:deb/debian/util-linux@2.42-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081585?format=json","purl":"pkg:deb/debian/util-linux@2.42-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-5%3Fdistro=trixie"}],"aliases":["CVE-2021-37600"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7ha4-8xxt-xkfy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/349414?format=json","vulnerability_id":"VCID-8hsf-75uj-13cd","summary":"","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27456.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27456.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-27456","reference_id":"","reference_type":"","scores":[{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01166","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01172","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0001","scoring_system":"epss","scoring_elements":"0.01156","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01465","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01475","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01474","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01481","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01489","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01737","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01567","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00012","scoring_system":"epss","scoring_elements":"0.01479","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03147","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00015","scoring_system":"epss","scoring_elements":"0.03101","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-27456"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27456","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27456"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2454956","reference_id":"2454956","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2454956"},{"reference_url":"https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4","reference_id":"5e390467b26a3cf3fecc04e1a0d482dff3162fc4","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-06T15:38:42Z/"}],"url":"https://github.com/util-linux/util-linux/commit/5e390467b26a3cf3fecc04e1a0d482dff3162fc4"},{"reference_url":"https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g","reference_id":"GHSA-qq4x-vfq4-9h9g","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-06T15:38:42Z/"}],"url":"https://github.com/util-linux/util-linux/security/advisories/GHSA-qq4x-vfq4-9h9g"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7180","reference_id":"RHSA-2026:7180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7180"},{"reference_url":"https://github.com/util-linux/util-linux/releases/tag/v2.41.4","reference_id":"v2.41.4","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-06T15:38:42Z/"}],"url":"https://github.com/util-linux/util-linux/releases/tag/v2.41.4"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941945?format=json","purl":"pkg:deb/debian/util-linux@2.42-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1059664?format=json","purl":"pkg:deb/debian/util-linux@2.42-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062547?format=json","purl":"pkg:deb/debian/util-linux@2.42-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072664?format=json","purl":"pkg:deb/debian/util-linux@2.42-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081585?format=json","purl":"pkg:deb/debian/util-linux@2.42-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-5%3Fdistro=trixie"}],"aliases":["CVE-2026-27456"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8hsf-75uj-13cd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49127?format=json","vulnerability_id":"VCID-9czu-jh2d-dbhx","summary":"Multiple vulnerabilities have been discovered in util-linux which can lead to denial of service or information disclosure.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3995.json","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3995.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3995","reference_id":"","reference_type":"","scores":[{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.4213","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42189","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42217","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42157","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42207","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42215","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42238","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42201","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42175","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42226","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42132","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42077","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42073","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.41991","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-3995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3995"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3996"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024631","reference_id":"2024631","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2024631"},{"reference_url":"https://security.gentoo.org/glsa/202401-08","reference_id":"GLSA-202401-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-08"},{"reference_url":"https://usn.ubuntu.com/5279-1/","reference_id":"USN-5279-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5279-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941962?format=json","purl":"pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941943?format=json","purl":"pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941961?format=json","purl":"pkg:deb/debian/util-linux@2.37.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.37.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941941?format=json","purl":"pkg:deb/debian/util-linux@2.38.1-5%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.38.1-5%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941946?format=json","purl":"pkg:deb/debian/util-linux@2.41-5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941944?format=json","purl":"pkg:deb/debian/util-linux@2.41.3-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41.3-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941945?format=json","purl":"pkg:deb/debian/util-linux@2.42-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1059664?format=json","purl":"pkg:deb/debian/util-linux@2.42-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062547?format=json","purl":"pkg:deb/debian/util-linux@2.42-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072664?format=json","purl":"pkg:deb/debian/util-linux@2.42-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081585?format=json","purl":"pkg:deb/debian/util-linux@2.42-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-5%3Fdistro=trixie"}],"aliases":["CVE-2021-3995"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9czu-jh2d-dbhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59297?format=json","vulnerability_id":"VCID-9ec4-db9h-47bu","summary":"Multiple vulnerabilities have been found in util-linux, the worst\n    of which may lead to Denial of Service.","references":[{"reference_url":"http://openwall.com/lists/oss-security/2011/03/04/10","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/04/10"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/04/11","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/04/11"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/04/12","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/04/12"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/04/9","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/04/9"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/05/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/05/3"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/05/7","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/05/7"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/07/9","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/07/9"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/14/16","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/14/16"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/14/5","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/14/5"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/14/7","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/14/7"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/15/6","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/15/6"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/22/4","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/22/4"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/22/6","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/22/6"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/31/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/31/3"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/31/4","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/31/4"},{"reference_url":"http://openwall.com/lists/oss-security/2011/04/01/2","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/04/01/2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1675.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1675.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1675","reference_id":"","reference_type":"","scores":[{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11248","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11361","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11499","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11552","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11338","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11421","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11479","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11486","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11453","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11424","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11289","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11413","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11357","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11314","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1675"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1675"},{"reference_url":"http://secunia.com/advisories/48114","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48114"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66705","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66705"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-1691.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-1691.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=695916","reference_id":"695916","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=695916"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.12:pre:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.12:pre:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.12:pre:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.13:pre:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.13:pre:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.13:pre:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1675","reference_id":"CVE-2011-1675","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1675"},{"reference_url":"https://security.gentoo.org/glsa/201405-15","reference_id":"GLSA-201405-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1691","reference_id":"RHSA-2011:1691","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1691"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0307","reference_id":"RHSA-2012:0307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0307"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941952?format=json","purl":"pkg:deb/debian/util-linux@2.20.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.20.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941943?format=json","purl":"pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941941?format=json","purl":"pkg:deb/debian/util-linux@2.38.1-5%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.38.1-5%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941946?format=json","purl":"pkg:deb/debian/util-linux@2.41-5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941944?format=json","purl":"pkg:deb/debian/util-linux@2.41.3-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41.3-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941945?format=json","purl":"pkg:deb/debian/util-linux@2.42-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1059664?format=json","purl":"pkg:deb/debian/util-linux@2.42-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062547?format=json","purl":"pkg:deb/debian/util-linux@2.42-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072664?format=json","purl":"pkg:deb/debian/util-linux@2.42-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081585?format=json","purl":"pkg:deb/debian/util-linux@2.42-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-5%3Fdistro=trixie"}],"aliases":["CVE-2011-1675"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9ec4-db9h-47bu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/38976?format=json","vulnerability_id":"VCID-a5ny-vcsw-uqh1","summary":"Multiple vulnerabilities have been found in Shadow, the worst of\n    which might allow privilege escalation.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2616.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2616.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2616","reference_id":"","reference_type":"","scores":[{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19051","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19295","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19429","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19477","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19195","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19273","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19325","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.1933","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19282","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19227","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19187","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19196","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19207","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19105","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19096","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-2616"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6252","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6252"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2616","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2616"},{"reference_url":"http://www.securitytracker.com/id/1038271","reference_id":"1038271","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"}],"url":"http://www.securitytracker.com/id/1038271"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1418710","reference_id":"1418710","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1418710"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855943","reference_id":"855943","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=855943"},{"reference_url":"http://www.securityfocus.com/bid/96404","reference_id":"96404","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"}],"url":"http://www.securityfocus.com/bid/96404"},{"reference_url":"https://github.com/karelzak/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891","reference_id":"dffab154d29a288aa171ff50263ecc8f2e14a891","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"}],"url":"https://github.com/karelzak/util-linux/commit/dffab154d29a288aa171ff50263ecc8f2e14a891"},{"reference_url":"https://www.debian.org/security/2017/dsa-3793","reference_id":"dsa-3793","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"}],"url":"https://www.debian.org/security/2017/dsa-3793"},{"reference_url":"https://security.gentoo.org/glsa/201706-02","reference_id":"GLSA-201706-02","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"}],"url":"https://security.gentoo.org/glsa/201706-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0654","reference_id":"RHSA-2017:0654","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0654"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0654.html","reference_id":"RHSA-2017-0654.html","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2017-0654.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0907","reference_id":"RHSA-2017:0907","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"}],"url":"https://access.redhat.com/errata/RHSA-2017:0907"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2616","reference_id":"show_bug.cgi?id=CVE-2017-2616","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:37:36Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2616"},{"reference_url":"https://usn.ubuntu.com/3276-1/","reference_id":"USN-3276-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3276-1/"},{"reference_url":"https://usn.ubuntu.com/3276-3/","reference_id":"USN-3276-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3276-3/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941958?format=json","purl":"pkg:deb/debian/util-linux@2.29.2-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.29.2-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941943?format=json","purl":"pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941941?format=json","purl":"pkg:deb/debian/util-linux@2.38.1-5%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.38.1-5%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941946?format=json","purl":"pkg:deb/debian/util-linux@2.41-5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941944?format=json","purl":"pkg:deb/debian/util-linux@2.41.3-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41.3-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941945?format=json","purl":"pkg:deb/debian/util-linux@2.42-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1059664?format=json","purl":"pkg:deb/debian/util-linux@2.42-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062547?format=json","purl":"pkg:deb/debian/util-linux@2.42-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072664?format=json","purl":"pkg:deb/debian/util-linux@2.42-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081585?format=json","purl":"pkg:deb/debian/util-linux@2.42-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-5%3Fdistro=trixie"}],"aliases":["(+","CVE-2017-2616","fix)","regression"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a5ny-vcsw-uqh1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85546?format=json","vulnerability_id":"VCID-arhf-bsdt-pbb6","summary":"util-linux: File name collision due to incorrect mkstemp use","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5224.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5224.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5224","reference_id":"","reference_type":"","scores":[{"value":"0.04076","scoring_system":"epss","scoring_elements":"0.88578","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04076","scoring_system":"epss","scoring_elements":"0.8854","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04076","scoring_system":"epss","scoring_elements":"0.88544","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04076","scoring_system":"epss","scoring_elements":"0.88556","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04076","scoring_system":"epss","scoring_elements":"0.88548","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04076","scoring_system":"epss","scoring_elements":"0.88562","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04076","scoring_system":"epss","scoring_elements":"0.88558","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04076","scoring_system":"epss","scoring_elements":"0.88574","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04076","scoring_system":"epss","scoring_elements":"0.88579","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04076","scoring_system":"epss","scoring_elements":"0.88493","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04076","scoring_system":"epss","scoring_elements":"0.88501","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04076","scoring_system":"epss","scoring_elements":"0.88517","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04076","scoring_system":"epss","scoring_elements":"0.88521","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5224"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5224","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5224"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:N/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1256686","reference_id":"1256686","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-04T20:03:56Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1256686"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/08/24/3","reference_id":"3","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-04T20:03:56Z/"}],"url":"http://www.openwall.com/lists/oss-security/2015/08/24/3"},{"reference_url":"http://www.securityfocus.com/bid/76467","reference_id":"76467","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-04T20:03:56Z/"}],"url":"http://www.securityfocus.com/bid/76467"},{"reference_url":"https://github.com/karelzak/util-linux/commit/bde91c85bdc77975155058276f99d2e0f5eab5a9","reference_id":"bde91c85bdc77975155058276f99d2e0f5eab5a9","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-04T20:03:56Z/"}],"url":"https://github.com/karelzak/util-linux/commit/bde91c85bdc77975155058276f99d2e0f5eab5a9"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941955?format=json","purl":"pkg:deb/debian/util-linux@2.27-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.27-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941943?format=json","purl":"pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941941?format=json","purl":"pkg:deb/debian/util-linux@2.38.1-5%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.38.1-5%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941946?format=json","purl":"pkg:deb/debian/util-linux@2.41-5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941944?format=json","purl":"pkg:deb/debian/util-linux@2.41.3-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41.3-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941945?format=json","purl":"pkg:deb/debian/util-linux@2.42-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1059664?format=json","purl":"pkg:deb/debian/util-linux@2.42-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062547?format=json","purl":"pkg:deb/debian/util-linux@2.42-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072664?format=json","purl":"pkg:deb/debian/util-linux@2.42-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081585?format=json","purl":"pkg:deb/debian/util-linux@2.42-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-5%3Fdistro=trixie"}],"aliases":["CVE-2015-5224"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-arhf-bsdt-pbb6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85316?format=json","vulnerability_id":"VCID-ed2c-q43s-cydc","summary":"util-linux: runuser tty hijack via TIOCSTI ioctl","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2779.json","reference_id":"","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2779.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2779","reference_id":"","reference_type":"","scores":[{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12145","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.1214","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12103","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12262","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12307","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12105","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12185","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12237","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12244","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12209","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12173","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12042","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12045","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12159","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2779"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:C/I:C/A:C"},{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1312852","reference_id":"1312852","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1312852"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922","reference_id":"815922","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=815922"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941956?format=json","purl":"pkg:deb/debian/util-linux@2.31.1-0.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.31.1-0.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941943?format=json","purl":"pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941941?format=json","purl":"pkg:deb/debian/util-linux@2.38.1-5%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.38.1-5%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941946?format=json","purl":"pkg:deb/debian/util-linux@2.41-5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941944?format=json","purl":"pkg:deb/debian/util-linux@2.41.3-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41.3-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941945?format=json","purl":"pkg:deb/debian/util-linux@2.42-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1059664?format=json","purl":"pkg:deb/debian/util-linux@2.42-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062547?format=json","purl":"pkg:deb/debian/util-linux@2.42-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072664?format=json","purl":"pkg:deb/debian/util-linux@2.42-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081585?format=json","purl":"pkg:deb/debian/util-linux@2.42-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-5%3Fdistro=trixie"}],"aliases":["CVE-2016-2779"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ed2c-q43s-cydc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/85534?format=json","vulnerability_id":"VCID-etmy-48fm-vudb","summary":"colcrt: global-buffer-overflow","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2015-11/msg00035.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5218.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5218.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5218","reference_id":"","reference_type":"","scores":[{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23009","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23167","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23345","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23384","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23173","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23246","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23296","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23318","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.2328","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23223","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23239","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23232","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23212","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23019","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00078","scoring_system":"epss","scoring_elements":"0.23012","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-5218"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5218","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5218"},{"reference_url":"https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8"},{"reference_url":"https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec"},{"reference_url":"https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes","reference_id":"","reference_type":"","scores":[],"url":"https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes"},{"reference_url":"http://www.spinics.net/lists/util-linux-ng/msg11873.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.spinics.net/lists/util-linux-ng/msg11873.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1259322","reference_id":"1259322","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1259322"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798067","reference_id":"798067","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798067"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse_project:leap:42.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse_project:leap:42.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse_project:leap:42.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5218","reference_id":"CVE-2015-5218","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-5218"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941955?format=json","purl":"pkg:deb/debian/util-linux@2.27-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.27-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941943?format=json","purl":"pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941941?format=json","purl":"pkg:deb/debian/util-linux@2.38.1-5%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.38.1-5%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941946?format=json","purl":"pkg:deb/debian/util-linux@2.41-5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941944?format=json","purl":"pkg:deb/debian/util-linux@2.41.3-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41.3-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941945?format=json","purl":"pkg:deb/debian/util-linux@2.42-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1059664?format=json","purl":"pkg:deb/debian/util-linux@2.42-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062547?format=json","purl":"pkg:deb/debian/util-linux@2.42-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072664?format=json","purl":"pkg:deb/debian/util-linux@2.42-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081585?format=json","purl":"pkg:deb/debian/util-linux@2.42-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-5%3Fdistro=trixie"}],"aliases":["CVE-2015-5218"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-etmy-48fm-vudb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59300?format=json","vulnerability_id":"VCID-f2gk-ah7t-huge","summary":"Multiple vulnerabilities have been found in util-linux, the worst\n    of which may lead to Denial of Service.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0157.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0157.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-0157","reference_id":"","reference_type":"","scores":[{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18174","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18332","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18386","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18087","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18172","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18225","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18229","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18182","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18131","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18075","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18118","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18025","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.18001","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00058","scoring_system":"epss","scoring_elements":"0.17964","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-0157"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0157","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0157"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697464","reference_id":"697464","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697464"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=892330","reference_id":"892330","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=892330"},{"reference_url":"https://security.gentoo.org/glsa/201405-15","reference_id":"GLSA-201405-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0517","reference_id":"RHSA-2013:0517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0517"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941953?format=json","purl":"pkg:deb/debian/util-linux@2.20.1-5.5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.20.1-5.5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941943?format=json","purl":"pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941941?format=json","purl":"pkg:deb/debian/util-linux@2.38.1-5%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.38.1-5%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941946?format=json","purl":"pkg:deb/debian/util-linux@2.41-5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941944?format=json","purl":"pkg:deb/debian/util-linux@2.41.3-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41.3-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941945?format=json","purl":"pkg:deb/debian/util-linux@2.42-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1059664?format=json","purl":"pkg:deb/debian/util-linux@2.42-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062547?format=json","purl":"pkg:deb/debian/util-linux@2.42-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072664?format=json","purl":"pkg:deb/debian/util-linux@2.42-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081585?format=json","purl":"pkg:deb/debian/util-linux@2.42-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-5%3Fdistro=trixie"}],"aliases":["CVE-2013-0157"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f2gk-ah7t-huge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59299?format=json","vulnerability_id":"VCID-hhx5-q9sz-eybx","summary":"Multiple vulnerabilities have been found in util-linux, the worst\n    of which may lead to Denial of Service.","references":[{"reference_url":"http://openwall.com/lists/oss-security/2011/03/04/10","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/04/10"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/04/11","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/04/11"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/04/12","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/04/12"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/04/9","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/04/9"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/05/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/05/3"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/05/7","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/05/7"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/07/9","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/07/9"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/14/16","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/14/16"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/14/5","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/14/5"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/14/7","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/14/7"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/15/6","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/15/6"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/22/4","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/22/4"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/22/6","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/22/6"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/31/3","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/31/3"},{"reference_url":"http://openwall.com/lists/oss-security/2011/03/31/4","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/03/31/4"},{"reference_url":"http://openwall.com/lists/oss-security/2011/04/01/2","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2011/04/01/2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1677.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-1677.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1677","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1348","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13647","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13744","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13803","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13603","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13684","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13736","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13705","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13669","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1362","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13535","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13533","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13607","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13617","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13589","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1677"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1677","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1677"},{"reference_url":"http://secunia.com/advisories/48114","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/48114"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66703","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/66703"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-1691.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2011-1691.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=695924","reference_id":"695924","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=695924"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.12:pre:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.12:pre:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.12:pre:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.13:pre:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.13:pre:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.13:pre:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:linux:util-linux:2.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:linux:util-linux:2.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1677","reference_id":"CVE-2011-1677","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2011-1677"},{"reference_url":"https://security.gentoo.org/glsa/201405-15","reference_id":"GLSA-201405-15","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201405-15"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:1691","reference_id":"RHSA-2011:1691","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:1691"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0307","reference_id":"RHSA-2012:0307","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0307"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941952?format=json","purl":"pkg:deb/debian/util-linux@2.20.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.20.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941943?format=json","purl":"pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941941?format=json","purl":"pkg:deb/debian/util-linux@2.38.1-5%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.38.1-5%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941946?format=json","purl":"pkg:deb/debian/util-linux@2.41-5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941944?format=json","purl":"pkg:deb/debian/util-linux@2.41.3-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41.3-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941945?format=json","purl":"pkg:deb/debian/util-linux@2.42-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1059664?format=json","purl":"pkg:deb/debian/util-linux@2.42-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062547?format=json","purl":"pkg:deb/debian/util-linux@2.42-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072664?format=json","purl":"pkg:deb/debian/util-linux@2.42-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081585?format=json","purl":"pkg:deb/debian/util-linux@2.42-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-5%3Fdistro=trixie"}],"aliases":["CVE-2011-1677"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hhx5-q9sz-eybx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88483?format=json","vulnerability_id":"VCID-kj8n-e8vx-xbe8","summary":"util-linux: audit log injection via login","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1926.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1926.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1926","reference_id":"","reference_type":"","scores":[{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82601","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82616","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82631","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82627","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82652","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.8266","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82677","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82672","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82667","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82704","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82705","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82708","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.8273","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82739","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01774","scoring_system":"epss","scoring_elements":"0.82746","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1926"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1926","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1926"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=443925","reference_id":"443925","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=443925"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=478135","reference_id":"478135","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=478135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0981","reference_id":"RHSA-2009:0981","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0981"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941951?format=json","purl":"pkg:deb/debian/util-linux@2.13.1.1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.13.1.1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941943?format=json","purl":"pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941941?format=json","purl":"pkg:deb/debian/util-linux@2.38.1-5%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.38.1-5%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941946?format=json","purl":"pkg:deb/debian/util-linux@2.41-5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941944?format=json","purl":"pkg:deb/debian/util-linux@2.41.3-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41.3-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941945?format=json","purl":"pkg:deb/debian/util-linux@2.42-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1059664?format=json","purl":"pkg:deb/debian/util-linux@2.42-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062547?format=json","purl":"pkg:deb/debian/util-linux@2.42-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072664?format=json","purl":"pkg:deb/debian/util-linux@2.42-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081585?format=json","purl":"pkg:deb/debian/util-linux@2.42-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-5%3Fdistro=trixie"}],"aliases":["CVE-2008-1926"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kj8n-e8vx-xbe8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88924?format=json","vulnerability_id":"VCID-p35v-d4cm-c7b6","summary":"security flaw","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7108.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7108.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-7108","reference_id":"","reference_type":"","scores":[{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23662","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23871","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.2399","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.2403","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23815","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23882","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23928","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23944","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23901","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23847","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23858","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23828","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23709","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00081","scoring_system":"epss","scoring_elements":"0.23698","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-7108"},{"reference_url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=177331","reference_id":"","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=177331"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7108"},{"reference_url":"http://secunia.com/advisories/25098","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25098"},{"reference_url":"http://secunia.com/advisories/25530","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25530"},{"reference_url":"http://secunia.com/advisories/25692","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25692"},{"reference_url":"http://secunia.com/advisories/25935","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/25935"},{"reference_url":"https://issues.rpath.com/browse/RPL-1359","reference_id":"","reference_type":"","scores":[],"url":"https://issues.rpath.com/browse/RPL-1359"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9689","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9689"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2007-252.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-252.htm"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:111","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:111"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2007-0235.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2007-0235.html"},{"reference_url":"http://www.securityfocus.com/bid/24321","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/24321"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618255","reference_id":"1618255","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618255"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.12a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:andries_brouwer:util-linux:2.12a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.12a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2006-7108","reference_id":"CVE-2006-7108","reference_type":"","scores":[{"value":"4.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-7108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0235","reference_id":"RHSA-2007:0235","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0235"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941948?format=json","purl":"pkg:deb/debian/util-linux@2.17.2-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.17.2-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941943?format=json","purl":"pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941941?format=json","purl":"pkg:deb/debian/util-linux@2.38.1-5%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.38.1-5%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941946?format=json","purl":"pkg:deb/debian/util-linux@2.41-5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941944?format=json","purl":"pkg:deb/debian/util-linux@2.41.3-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41.3-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941945?format=json","purl":"pkg:deb/debian/util-linux@2.42-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1059664?format=json","purl":"pkg:deb/debian/util-linux@2.42-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062547?format=json","purl":"pkg:deb/debian/util-linux@2.42-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072664?format=json","purl":"pkg:deb/debian/util-linux@2.42-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081585?format=json","purl":"pkg:deb/debian/util-linux@2.42-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-5%3Fdistro=trixie"}],"aliases":["CVE-2006-7108"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p35v-d4cm-c7b6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/58231?format=json","vulnerability_id":"VCID-rew1-z9tf-wyaj","summary":"The mount and umount programs might allow local attackers to gain root\n    privileges.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5191.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-5191.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5191","reference_id":"","reference_type":"","scores":[{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26965","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.27005","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.27042","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26832","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26901","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26947","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26951","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26907","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.2685","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26862","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26794","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26737","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26729","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26659","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-5191"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5191","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5191"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=320041","reference_id":"320041","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=320041"},{"reference_url":"https://security.gentoo.org/glsa/200710-18","reference_id":"GLSA-200710-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200710-18"},{"reference_url":"https://access.redhat.com/errata/RHSA-2007:0969","reference_id":"RHSA-2007:0969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2007:0969"},{"reference_url":"https://usn.ubuntu.com/533-1/","reference_id":"USN-533-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/533-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941950?format=json","purl":"pkg:deb/debian/util-linux@2.13-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.13-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941943?format=json","purl":"pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941941?format=json","purl":"pkg:deb/debian/util-linux@2.38.1-5%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.38.1-5%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941946?format=json","purl":"pkg:deb/debian/util-linux@2.41-5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941944?format=json","purl":"pkg:deb/debian/util-linux@2.41.3-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41.3-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941945?format=json","purl":"pkg:deb/debian/util-linux@2.42-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1059664?format=json","purl":"pkg:deb/debian/util-linux@2.42-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062547?format=json","purl":"pkg:deb/debian/util-linux@2.42-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072664?format=json","purl":"pkg:deb/debian/util-linux@2.42-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081585?format=json","purl":"pkg:deb/debian/util-linux@2.42-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-5%3Fdistro=trixie"}],"aliases":["CVE-2007-5191"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rew1-z9tf-wyaj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/60896?format=json","vulnerability_id":"VCID-rnst-1ugv-pufk","summary":"A vulnerability was discovered in util-linux, which could\n    potentially lead to the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7738.json","reference_id":"","reference_type":"","scores":[{"value":"6.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-7738.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7738","reference_id":"","reference_type":"","scores":[{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21492","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21662","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21719","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21472","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21549","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21607","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2162","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21582","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21525","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21522","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2153","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21498","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21352","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2135","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21328","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-7738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7738"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1552641","reference_id":"1552641","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1552641"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892179","reference_id":"892179","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=892179"},{"reference_url":"https://security.gentoo.org/glsa/201803-02","reference_id":"GLSA-201803-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201803-02"},{"reference_url":"https://usn.ubuntu.com/4512-1/","reference_id":"USN-4512-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4512-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941959?format=json","purl":"pkg:deb/debian/util-linux@2.31.1-0.5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.31.1-0.5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941943?format=json","purl":"pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941941?format=json","purl":"pkg:deb/debian/util-linux@2.38.1-5%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.38.1-5%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941946?format=json","purl":"pkg:deb/debian/util-linux@2.41-5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941944?format=json","purl":"pkg:deb/debian/util-linux@2.41.3-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41.3-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941945?format=json","purl":"pkg:deb/debian/util-linux@2.42-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1059664?format=json","purl":"pkg:deb/debian/util-linux@2.42-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062547?format=json","purl":"pkg:deb/debian/util-linux@2.42-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072664?format=json","purl":"pkg:deb/debian/util-linux@2.42-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081585?format=json","purl":"pkg:deb/debian/util-linux@2.42-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-5%3Fdistro=trixie"}],"aliases":["CVE-2018-7738"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rnst-1ugv-pufk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/48445?format=json","vulnerability_id":"VCID-s9ab-gzsp-wkdz","summary":"A vulnerability was discovered in util-linux, which could\n    potentially lead to the execution of arbitrary code.","references":[{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145188.html","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-12-04T20:21:03Z/"}],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-December/145188.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146229.html","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-12-04T20:21:03Z/"}],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146229.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00035.html","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-12-04T20:21:03Z/"}],"url":"http://lists.opensuse.org/opensuse-updates/2015-01/msg00035.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9114.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9114.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9114","reference_id":"","reference_type":"","scores":[{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32722","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32853","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32888","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32709","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32757","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32784","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32785","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32748","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32761","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32737","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32707","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32557","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.3244","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32357","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-9114"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9114","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9114"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/98993","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-12-04T20:21:03Z/"}],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/98993"},{"reference_url":"https://github.com/karelzak/util-linux/commit/89e90ae7b2826110ea28c1c0eb8e7c56c3907bdc","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-12-04T20:21:03Z/"}],"url":"https://github.com/karelzak/util-linux/commit/89e90ae7b2826110ea28c1c0eb8e7c56c3907bdc"},{"reference_url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-12-04T20:21:03Z/"}],"url":"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-12-04T20:21:03Z/"}],"url":"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E"},{"reference_url":"http://www.openwall.com/lists/oss-security/2014/11/26/21","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-12-04T20:21:03Z/"}],"url":"http://www.openwall.com/lists/oss-security/2014/11/26/21"},{"reference_url":"http://www.securityfocus.com/bid/71327","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-12-04T20:21:03Z/"}],"url":"http://www.securityfocus.com/bid/71327"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168485","reference_id":"1168485","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-12-04T20:21:03Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1168485"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771274","reference_id":"771274","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771274"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kernel:util-linux:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9114","reference_id":"CVE-2014-9114","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"},{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-9114"},{"reference_url":"https://security.gentoo.org/glsa/201612-14","reference_id":"GLSA-201612-14","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-12-04T20:21:03Z/"}],"url":"https://security.gentoo.org/glsa/201612-14"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941954?format=json","purl":"pkg:deb/debian/util-linux@2.25.2-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.25.2-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941943?format=json","purl":"pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941941?format=json","purl":"pkg:deb/debian/util-linux@2.38.1-5%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.38.1-5%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941946?format=json","purl":"pkg:deb/debian/util-linux@2.41-5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941944?format=json","purl":"pkg:deb/debian/util-linux@2.41.3-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41.3-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941945?format=json","purl":"pkg:deb/debian/util-linux@2.42-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1059664?format=json","purl":"pkg:deb/debian/util-linux@2.42-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062547?format=json","purl":"pkg:deb/debian/util-linux@2.42-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072664?format=json","purl":"pkg:deb/debian/util-linux@2.42-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081585?format=json","purl":"pkg:deb/debian/util-linux@2.42-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-5%3Fdistro=trixie"}],"aliases":["CVE-2014-9114"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s9ab-gzsp-wkdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66331?format=json","vulnerability_id":"VCID-uchq-5u5j-wbez","summary":"util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14104.json","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14104.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-14104","reference_id":"","reference_type":"","scores":[{"value":"6e-05","scoring_system":"epss","scoring_elements":"0.00433","published_at":"2026-04-04T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00458","published_at":"2026-04-11T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00454","published_at":"2026-04-12T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00453","published_at":"2026-04-13T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00451","published_at":"2026-04-16T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00456","published_at":"2026-04-18T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00585","published_at":"2026-04-29T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00461","published_at":"2026-04-07T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00459","published_at":"2026-04-08T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00586","published_at":"2026-04-21T12:55:00Z"},{"value":"7e-05","scoring_system":"epss","scoring_elements":"0.00583","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-14104"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14104"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1122058","reference_id":"1122058","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1122058"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419369","reference_id":"2419369","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T20:03:09Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2419369"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9","reference_id":"cpe:/a:redhat:ceph_storage:7::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:8::el9","reference_id":"cpe:/a:redhat:ceph_storage:8::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:8::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:9::el10","reference_id":"cpe:/a:redhat:ceph_storage:9::el10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:9::el10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb","reference_id":"cpe:/a:redhat:enterprise_linux:8::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb","reference_id":"cpe:/a:redhat:enterprise_linux:9::crb","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1","reference_id":"cpe:/a:redhat:hummingbird:1","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9","reference_id":"cpe:/a:redhat:insights_proxy:1.5::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4","reference_id":"cpe:/a:redhat:openshift:4","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhui:5::el9","reference_id":"cpe:/a:redhat:rhui:5::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhui:5::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1","reference_id":"cpe:/o:redhat:enterprise_linux:10.1","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:9::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-14104","reference_id":"CVE-2025-14104","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T20:03:09Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-14104"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1696","reference_id":"RHSA-2026:1696","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T20:03:09Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:1696"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1852","reference_id":"RHSA-2026:1852","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T20:03:09Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:1852"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:1913","reference_id":"RHSA-2026:1913","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T20:03:09Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:1913"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2485","reference_id":"RHSA-2026:2485","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T20:03:09Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:2485"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2563","reference_id":"RHSA-2026:2563","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T20:03:09Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:2563"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2737","reference_id":"RHSA-2026:2737","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T20:03:09Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:2737"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:2800","reference_id":"RHSA-2026:2800","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T20:03:09Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:2800"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:3406","reference_id":"RHSA-2026:3406","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T20:03:09Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:3406"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:4943","reference_id":"RHSA-2026:4943","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T20:03:09Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:4943"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7180","reference_id":"RHSA-2026:7180","reference_type":"","scores":[{"value":"6.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-05T20:03:09Z/"}],"url":"https://access.redhat.com/errata/RHSA-2026:7180"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941965?format=json","purl":"pkg:deb/debian/util-linux@2.41.3-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41.3-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941944?format=json","purl":"pkg:deb/debian/util-linux@2.41.3-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41.3-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941945?format=json","purl":"pkg:deb/debian/util-linux@2.42-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1059664?format=json","purl":"pkg:deb/debian/util-linux@2.42-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062547?format=json","purl":"pkg:deb/debian/util-linux@2.42-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072664?format=json","purl":"pkg:deb/debian/util-linux@2.42-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081585?format=json","purl":"pkg:deb/debian/util-linux@2.42-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-5%3Fdistro=trixie"}],"aliases":["CVE-2025-14104"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uchq-5u5j-wbez"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88978?format=json","vulnerability_id":"VCID-y5g5-me96-h3fs","summary":"security flaw","references":[{"reference_url":"http://marc.info/?l=bugtraq&m=112656096125857&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=112656096125857&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=112690609622266&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=112690609622266&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2876.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2876.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-2876","reference_id":"","reference_type":"","scores":[{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14764","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14885","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14933","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1501","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14813","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14902","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14953","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14917","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14879","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1482","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14716","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14723","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14783","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14821","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-2876"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2876","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2876"},{"reference_url":"http://secunia.com/advisories/16785","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/16785"},{"reference_url":"http://secunia.com/advisories/16988","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/16988"},{"reference_url":"http://secunia.com/advisories/17004","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17004"},{"reference_url":"http://secunia.com/advisories/17027","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17027"},{"reference_url":"http://secunia.com/advisories/17133","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17133"},{"reference_url":"http://secunia.com/advisories/17154","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/17154"},{"reference_url":"http://secunia.com/advisories/18502","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18502"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/22241","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/22241"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10921","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10921"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101960-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101960-1"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2006-014.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2006-014.htm"},{"reference_url":"http://www.debian.org/security/2005/dsa-823","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-823"},{"reference_url":"http://www.debian.org/security/2005/dsa-825","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-825"},{"reference_url":"http://www.novell.com/linux/security/advisories/2005_21_sr.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.novell.com/linux/security/advisories/2005_21_sr.html"},{"reference_url":"http://www.osvdb.org/19369","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/19369"},{"reference_url":"http://www.securityfocus.com/archive/1/419774/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/419774/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/14816","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/14816"},{"reference_url":"http://www.ubuntu.com/usn/usn-184-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-184-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617764","reference_id":"1617764","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617764"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=328141","reference_id":"328141","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=328141"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.10f:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:andries_brouwer:util-linux:2.10f:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.10f:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.10m:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:andries_brouwer:util-linux:2.10m:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.10m:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.10p:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:andries_brouwer:util-linux:2.10p:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.10p:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.11f:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:andries_brouwer:util-linux:2.11f:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.11f:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.11n:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:andries_brouwer:util-linux:2.11n:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.11n:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.11q:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:andries_brouwer:util-linux:2.11q:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.11q:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.11r:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:andries_brouwer:util-linux:2.11r:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.11r:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.11w:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:andries_brouwer:util-linux:2.11w:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.11w:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.11x:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:andries_brouwer:util-linux:2.11x:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.11x:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.11y:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:andries_brouwer:util-linux:2.11y:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.11y:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.11z:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:andries_brouwer:util-linux:2.11z:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.11z:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.12a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:andries_brouwer:util-linux:2.12a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.12a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.12b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:andries_brouwer:util-linux:2.12b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.12b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.12i:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:andries_brouwer:util-linux:2.12i:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.12i:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.12j:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:andries_brouwer:util-linux:2.12j:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.12j:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.12k:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:andries_brouwer:util-linux:2.12k:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.12k:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.12o:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:andries_brouwer:util-linux:2.12o:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.12o:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.12p:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:andries_brouwer:util-linux:2.12p:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.12p:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.12q:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:andries_brouwer:util-linux:2.12q:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.12q:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.13_pre1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:andries_brouwer:util-linux:2.13_pre1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.13_pre1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.13_pre2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:andries_brouwer:util-linux:2.13_pre2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.13_pre2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.8_12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:andries_brouwer:util-linux:2.8_12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.8_12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.8.1_alpha:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:andries_brouwer:util-linux:2.8.1_alpha:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.8.1_alpha:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.9i:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:andries_brouwer:util-linux:2.9i:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.9i:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.9w:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:andries_brouwer:util-linux:2.9w:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:andries_brouwer:util-linux:2.9w:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-2876","reference_id":"CVE-2005-2876","reference_type":"","scores":[{"value":"7.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-2876"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:782","reference_id":"RHSA-2005:782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:782"},{"reference_url":"https://usn.ubuntu.com/184-1/","reference_id":"USN-184-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/184-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/941947?format=json","purl":"pkg:deb/debian/util-linux@2.12p-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.12p-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941943?format=json","purl":"pkg:deb/debian/util-linux@2.36.1-8%2Bdeb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.36.1-8%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941941?format=json","purl":"pkg:deb/debian/util-linux@2.38.1-5%2Bdeb12u3?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.38.1-5%252Bdeb12u3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941946?format=json","purl":"pkg:deb/debian/util-linux@2.41-5?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"},{"vulnerability":"VCID-uchq-5u5j-wbez"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41-5%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941944?format=json","purl":"pkg:deb/debian/util-linux@2.41.3-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-8hsf-75uj-13cd"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.41.3-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/941945?format=json","purl":"pkg:deb/debian/util-linux@2.42-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1059664?format=json","purl":"pkg:deb/debian/util-linux@2.42-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1062547?format=json","purl":"pkg:deb/debian/util-linux@2.42-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1072664?format=json","purl":"pkg:deb/debian/util-linux@2.42-4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1081585?format=json","purl":"pkg:deb/debian/util-linux@2.42-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-5%3Fdistro=trixie"}],"aliases":["CVE-2005-2876"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y5g5-me96-h3fs"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/util-linux@2.42-1%3Fdistro=trixie"}