|
pkg:alpm/archlinux/bind@9.11.1.P2-1
|
alpm
|
archlinux
|
bind
|
9.11.1.P2-1
|
|
|
false
|
9.11.2.P1-1
|
9.20.9-1
|
|
| 0 |
| url |
VCID-ddg3-vmpb-cbhs |
| vulnerability_id |
VCID-ddg3-vmpb-cbhs |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-3142 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04951 |
| scoring_system |
epss |
| scoring_elements |
0.89613 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.04951 |
| scoring_system |
epss |
| scoring_elements |
0.89652 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.04951 |
| scoring_system |
epss |
| scoring_elements |
0.89629 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.04951 |
| scoring_system |
epss |
| scoring_elements |
0.8963 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.04951 |
| scoring_system |
epss |
| scoring_elements |
0.89647 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.04951 |
| scoring_system |
epss |
| scoring_elements |
0.89653 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.04951 |
| scoring_system |
epss |
| scoring_elements |
0.8966 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.04951 |
| scoring_system |
epss |
| scoring_elements |
0.89658 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.04951 |
| scoring_system |
epss |
| scoring_elements |
0.89616 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-3142 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-3142
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ddg3-vmpb-cbhs |
|
| 1 |
| url |
VCID-tg7b-ra4c-cue1 |
| vulnerability_id |
VCID-tg7b-ra4c-cue1 |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-3143 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.26927 |
| scoring_system |
epss |
| scoring_elements |
0.96329 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.26927 |
| scoring_system |
epss |
| scoring_elements |
0.96364 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.26927 |
| scoring_system |
epss |
| scoring_elements |
0.96337 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.26927 |
| scoring_system |
epss |
| scoring_elements |
0.96341 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.26927 |
| scoring_system |
epss |
| scoring_elements |
0.96345 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.26927 |
| scoring_system |
epss |
| scoring_elements |
0.96353 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.26927 |
| scoring_system |
epss |
| scoring_elements |
0.96357 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.26927 |
| scoring_system |
epss |
| scoring_elements |
0.96361 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-3143 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-3143
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tg7b-ra4c-cue1 |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.11.1.P2-1
|
|
|
pkg:alpm/archlinux/bind@9.11.2-1
|
alpm
|
archlinux
|
bind
|
9.11.2-1
|
|
|
true
|
9.11.2.P1-1
|
9.20.9-1
|
| 0 |
| url |
VCID-s9ua-j61v-jbch |
| vulnerability_id |
VCID-s9ua-j61v-jbch |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-3145 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0799 |
| scoring_system |
epss |
| scoring_elements |
0.92054 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0799 |
| scoring_system |
epss |
| scoring_elements |
0.92087 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.0799 |
| scoring_system |
epss |
| scoring_elements |
0.92088 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.0799 |
| scoring_system |
epss |
| scoring_elements |
0.92092 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.0799 |
| scoring_system |
epss |
| scoring_elements |
0.9206 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.0799 |
| scoring_system |
epss |
| scoring_elements |
0.92069 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.0799 |
| scoring_system |
epss |
| scoring_elements |
0.92072 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.0799 |
| scoring_system |
epss |
| scoring_elements |
0.92084 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-3145 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-3145
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s9ua-j61v-jbch |
|
|
|
4.0
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.11.2-1
|
|
|
pkg:alpm/archlinux/bind@9.11.2.P1-1
|
alpm
|
archlinux
|
bind
|
9.11.2.P1-1
|
|
|
false
|
9.12.1.P2-1
|
9.20.9-1
|
|
| 0 |
| url |
VCID-s9ua-j61v-jbch |
| vulnerability_id |
VCID-s9ua-j61v-jbch |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-3145 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0799 |
| scoring_system |
epss |
| scoring_elements |
0.92054 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0799 |
| scoring_system |
epss |
| scoring_elements |
0.92087 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.0799 |
| scoring_system |
epss |
| scoring_elements |
0.92088 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.0799 |
| scoring_system |
epss |
| scoring_elements |
0.92092 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.0799 |
| scoring_system |
epss |
| scoring_elements |
0.9206 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.0799 |
| scoring_system |
epss |
| scoring_elements |
0.92069 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.0799 |
| scoring_system |
epss |
| scoring_elements |
0.92072 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.0799 |
| scoring_system |
epss |
| scoring_elements |
0.92084 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-3145 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-3145
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-s9ua-j61v-jbch |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.11.2.P1-1
|
|
|
pkg:alpm/archlinux/bind@9.12.1-1
|
alpm
|
archlinux
|
bind
|
9.12.1-1
|
|
|
true
|
9.12.1.P2-1
|
9.20.9-1
|
| 0 |
| url |
VCID-29ng-3xgz-hbh5 |
| vulnerability_id |
VCID-29ng-3xgz-hbh5 |
| summary |
bind: Multiple transfers of a zone in quick succession can cause an assertion failure in rbtdb.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-5736 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.42906 |
| scoring_system |
epss |
| scoring_elements |
0.97457 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.42906 |
| scoring_system |
epss |
| scoring_elements |
0.97482 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.42906 |
| scoring_system |
epss |
| scoring_elements |
0.97476 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.42906 |
| scoring_system |
epss |
| scoring_elements |
0.97479 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.42906 |
| scoring_system |
epss |
| scoring_elements |
0.97481 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.42906 |
| scoring_system |
epss |
| scoring_elements |
0.97464 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.42906 |
| scoring_system |
epss |
| scoring_elements |
0.97468 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.42906 |
| scoring_system |
epss |
| scoring_elements |
0.97475 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-5736 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-5736
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-29ng-3xgz-hbh5 |
|
| 1 |
| url |
VCID-5pz4-bxq7-27gh |
| vulnerability_id |
VCID-5pz4-bxq7-27gh |
| summary |
bind: Interaction between NSEC aggresive negative caching and the serve-stale feature can cause a denial of service |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-5737 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01186 |
| scoring_system |
epss |
| scoring_elements |
0.7874 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01186 |
| scoring_system |
epss |
| scoring_elements |
0.78791 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.01186 |
| scoring_system |
epss |
| scoring_elements |
0.78787 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.01186 |
| scoring_system |
epss |
| scoring_elements |
0.78794 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.01186 |
| scoring_system |
epss |
| scoring_elements |
0.78817 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.01186 |
| scoring_system |
epss |
| scoring_elements |
0.788 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.01186 |
| scoring_system |
epss |
| scoring_elements |
0.78748 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.01186 |
| scoring_system |
epss |
| scoring_elements |
0.78779 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.01186 |
| scoring_system |
epss |
| scoring_elements |
0.78761 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-5737 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-5737
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5pz4-bxq7-27gh |
|
|
|
3.4
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.12.1-1
|
|
|
pkg:alpm/archlinux/bind@9.12.1.P2-1
|
alpm
|
archlinux
|
bind
|
9.12.1.P2-1
|
|
|
false
|
9.13.2-1
|
9.20.9-1
|
|
| 0 |
| url |
VCID-29ng-3xgz-hbh5 |
| vulnerability_id |
VCID-29ng-3xgz-hbh5 |
| summary |
bind: Multiple transfers of a zone in quick succession can cause an assertion failure in rbtdb.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-5736 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.42906 |
| scoring_system |
epss |
| scoring_elements |
0.97457 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.42906 |
| scoring_system |
epss |
| scoring_elements |
0.97482 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.42906 |
| scoring_system |
epss |
| scoring_elements |
0.97476 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.42906 |
| scoring_system |
epss |
| scoring_elements |
0.97479 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.42906 |
| scoring_system |
epss |
| scoring_elements |
0.97481 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.42906 |
| scoring_system |
epss |
| scoring_elements |
0.97464 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.42906 |
| scoring_system |
epss |
| scoring_elements |
0.97468 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.42906 |
| scoring_system |
epss |
| scoring_elements |
0.97475 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-5736 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-5736
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-29ng-3xgz-hbh5 |
|
| 1 |
| url |
VCID-5pz4-bxq7-27gh |
| vulnerability_id |
VCID-5pz4-bxq7-27gh |
| summary |
bind: Interaction between NSEC aggresive negative caching and the serve-stale feature can cause a denial of service |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-5737 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01186 |
| scoring_system |
epss |
| scoring_elements |
0.7874 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01186 |
| scoring_system |
epss |
| scoring_elements |
0.78791 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.01186 |
| scoring_system |
epss |
| scoring_elements |
0.78787 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.01186 |
| scoring_system |
epss |
| scoring_elements |
0.78794 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.01186 |
| scoring_system |
epss |
| scoring_elements |
0.78817 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.01186 |
| scoring_system |
epss |
| scoring_elements |
0.788 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.01186 |
| scoring_system |
epss |
| scoring_elements |
0.78748 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.01186 |
| scoring_system |
epss |
| scoring_elements |
0.78779 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.01186 |
| scoring_system |
epss |
| scoring_elements |
0.78761 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-5737 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-5737
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5pz4-bxq7-27gh |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.12.1.P2-1
|
|
|
pkg:alpm/archlinux/bind@9.13.0-2
|
alpm
|
archlinux
|
bind
|
9.13.0-2
|
|
|
true
|
9.13.2-1
|
9.20.9-1
|
| 0 |
| url |
VCID-3kvk-745c-tfaf |
| vulnerability_id |
VCID-3kvk-745c-tfaf |
| summary |
Multiple vulnerabilities have been found in BIND, the worst of
which could result in a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-5738 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03303 |
| scoring_system |
epss |
| scoring_elements |
0.87181 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.03303 |
| scoring_system |
epss |
| scoring_elements |
0.87235 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.03303 |
| scoring_system |
epss |
| scoring_elements |
0.87205 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.03303 |
| scoring_system |
epss |
| scoring_elements |
0.87226 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.03303 |
| scoring_system |
epss |
| scoring_elements |
0.87233 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.03303 |
| scoring_system |
epss |
| scoring_elements |
0.87246 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.03303 |
| scoring_system |
epss |
| scoring_elements |
0.87239 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.03303 |
| scoring_system |
epss |
| scoring_elements |
0.87191 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.03303 |
| scoring_system |
epss |
| scoring_elements |
0.87208 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-5738 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-5738
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3kvk-745c-tfaf |
|
|
|
3.4
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.13.0-2
|
|
|
pkg:alpm/archlinux/bind@9.13.2-1
|
alpm
|
archlinux
|
bind
|
9.13.2-1
|
|
|
false
|
9.13.7-1
|
9.20.9-1
|
|
| 0 |
| url |
VCID-3kvk-745c-tfaf |
| vulnerability_id |
VCID-3kvk-745c-tfaf |
| summary |
Multiple vulnerabilities have been found in BIND, the worst of
which could result in a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-5738 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03303 |
| scoring_system |
epss |
| scoring_elements |
0.87181 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.03303 |
| scoring_system |
epss |
| scoring_elements |
0.87235 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.03303 |
| scoring_system |
epss |
| scoring_elements |
0.87205 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.03303 |
| scoring_system |
epss |
| scoring_elements |
0.87226 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.03303 |
| scoring_system |
epss |
| scoring_elements |
0.87233 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.03303 |
| scoring_system |
epss |
| scoring_elements |
0.87246 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.03303 |
| scoring_system |
epss |
| scoring_elements |
0.87239 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.03303 |
| scoring_system |
epss |
| scoring_elements |
0.87191 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.03303 |
| scoring_system |
epss |
| scoring_elements |
0.87208 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-5738 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-5738
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3kvk-745c-tfaf |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.13.2-1
|
|
|
pkg:alpm/archlinux/bind@9.13.5-5
|
alpm
|
archlinux
|
bind
|
9.13.5-5
|
|
|
true
|
9.13.7-1
|
9.20.9-1
|
| 0 |
| url |
VCID-4sf3-myam-p3bp |
| vulnerability_id |
VCID-4sf3-myam-p3bp |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-6465 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0128 |
| scoring_system |
epss |
| scoring_elements |
0.79523 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0128 |
| scoring_system |
epss |
| scoring_elements |
0.79571 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.0128 |
| scoring_system |
epss |
| scoring_elements |
0.79538 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0128 |
| scoring_system |
epss |
| scoring_elements |
0.79566 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0128 |
| scoring_system |
epss |
| scoring_elements |
0.79573 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0128 |
| scoring_system |
epss |
| scoring_elements |
0.79595 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0128 |
| scoring_system |
epss |
| scoring_elements |
0.79579 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0128 |
| scoring_system |
epss |
| scoring_elements |
0.79529 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.0128 |
| scoring_system |
epss |
| scoring_elements |
0.79551 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-6465 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-6465
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4sf3-myam-p3bp |
|
| 1 |
| url |
VCID-e8xu-cq82-x3bw |
| vulnerability_id |
VCID-e8xu-cq82-x3bw |
| summary |
bind: A specially crafted packet can cause named to leak memory |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-5744 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04441 |
| scoring_system |
epss |
| scoring_elements |
0.88999 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.04441 |
| scoring_system |
epss |
| scoring_elements |
0.89052 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.04441 |
| scoring_system |
epss |
| scoring_elements |
0.89024 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.04441 |
| scoring_system |
epss |
| scoring_elements |
0.89042 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.04441 |
| scoring_system |
epss |
| scoring_elements |
0.89047 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.04441 |
| scoring_system |
epss |
| scoring_elements |
0.89059 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.04441 |
| scoring_system |
epss |
| scoring_elements |
0.89055 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.04441 |
| scoring_system |
epss |
| scoring_elements |
0.89007 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.04441 |
| scoring_system |
epss |
| scoring_elements |
0.89022 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-5744 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-5744
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e8xu-cq82-x3bw |
|
| 2 |
| url |
VCID-sna2-5cuy-4fa2 |
| vulnerability_id |
VCID-sna2-5cuy-4fa2 |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-5745 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0053 |
| scoring_system |
epss |
| scoring_elements |
0.67154 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0053 |
| scoring_system |
epss |
| scoring_elements |
0.67191 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.0053 |
| scoring_system |
epss |
| scoring_elements |
0.67215 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0053 |
| scoring_system |
epss |
| scoring_elements |
0.67242 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0053 |
| scoring_system |
epss |
| scoring_elements |
0.67256 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0053 |
| scoring_system |
epss |
| scoring_elements |
0.67276 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0053 |
| scoring_system |
epss |
| scoring_elements |
0.67262 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67382 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-5745 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-5745
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sna2-5cuy-4fa2 |
|
|
|
4.0
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.13.5-5
|
|
|
pkg:alpm/archlinux/bind@9.13.7-1
|
alpm
|
archlinux
|
bind
|
9.13.7-1
|
|
|
false
|
9.14.7-1
|
9.20.9-1
|
|
| 0 |
| url |
VCID-4sf3-myam-p3bp |
| vulnerability_id |
VCID-4sf3-myam-p3bp |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-6465 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0128 |
| scoring_system |
epss |
| scoring_elements |
0.79523 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0128 |
| scoring_system |
epss |
| scoring_elements |
0.79571 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.0128 |
| scoring_system |
epss |
| scoring_elements |
0.79538 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0128 |
| scoring_system |
epss |
| scoring_elements |
0.79566 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0128 |
| scoring_system |
epss |
| scoring_elements |
0.79573 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0128 |
| scoring_system |
epss |
| scoring_elements |
0.79595 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0128 |
| scoring_system |
epss |
| scoring_elements |
0.79579 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0128 |
| scoring_system |
epss |
| scoring_elements |
0.79529 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.0128 |
| scoring_system |
epss |
| scoring_elements |
0.79551 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-6465 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-6465
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4sf3-myam-p3bp |
|
| 1 |
| url |
VCID-e8xu-cq82-x3bw |
| vulnerability_id |
VCID-e8xu-cq82-x3bw |
| summary |
bind: A specially crafted packet can cause named to leak memory |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-5744 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04441 |
| scoring_system |
epss |
| scoring_elements |
0.88999 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.04441 |
| scoring_system |
epss |
| scoring_elements |
0.89052 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.04441 |
| scoring_system |
epss |
| scoring_elements |
0.89024 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.04441 |
| scoring_system |
epss |
| scoring_elements |
0.89042 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.04441 |
| scoring_system |
epss |
| scoring_elements |
0.89047 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.04441 |
| scoring_system |
epss |
| scoring_elements |
0.89059 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.04441 |
| scoring_system |
epss |
| scoring_elements |
0.89055 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.04441 |
| scoring_system |
epss |
| scoring_elements |
0.89007 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.04441 |
| scoring_system |
epss |
| scoring_elements |
0.89022 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-5744 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-5744
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e8xu-cq82-x3bw |
|
| 2 |
| url |
VCID-sna2-5cuy-4fa2 |
| vulnerability_id |
VCID-sna2-5cuy-4fa2 |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-5745 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0053 |
| scoring_system |
epss |
| scoring_elements |
0.67154 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0053 |
| scoring_system |
epss |
| scoring_elements |
0.67191 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.0053 |
| scoring_system |
epss |
| scoring_elements |
0.67215 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.0053 |
| scoring_system |
epss |
| scoring_elements |
0.67242 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0053 |
| scoring_system |
epss |
| scoring_elements |
0.67256 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0053 |
| scoring_system |
epss |
| scoring_elements |
0.67276 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0053 |
| scoring_system |
epss |
| scoring_elements |
0.67262 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00533 |
| scoring_system |
epss |
| scoring_elements |
0.67382 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-5745 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-5745
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sna2-5cuy-4fa2 |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.13.7-1
|
|
|
pkg:alpm/archlinux/bind@9.14.6-1
|
alpm
|
archlinux
|
bind
|
9.14.6-1
|
|
|
true
|
9.14.7-1
|
9.20.9-1
|
| 0 |
| url |
VCID-7mbz-t9jk-juca |
| vulnerability_id |
VCID-7mbz-t9jk-juca |
| summary |
bind: A flaw in mirror zone validity checking can allow zone data to be spoofed |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-6475 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00621 |
| scoring_system |
epss |
| scoring_elements |
0.70006 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00621 |
| scoring_system |
epss |
| scoring_elements |
0.70069 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00621 |
| scoring_system |
epss |
| scoring_elements |
0.70009 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00621 |
| scoring_system |
epss |
| scoring_elements |
0.70057 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00621 |
| scoring_system |
epss |
| scoring_elements |
0.70073 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00621 |
| scoring_system |
epss |
| scoring_elements |
0.70096 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00621 |
| scoring_system |
epss |
| scoring_elements |
0.70082 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00621 |
| scoring_system |
epss |
| scoring_elements |
0.70018 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00621 |
| scoring_system |
epss |
| scoring_elements |
0.70033 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-6475 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-6475
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7mbz-t9jk-juca |
|
| 1 |
| url |
VCID-cufc-v1hn-jbdn |
| vulnerability_id |
VCID-cufc-v1hn-jbdn |
| summary |
bind: An error in QNAME minimization code can cause BIND to exit with an assertion failure |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-6476 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01269 |
| scoring_system |
epss |
| scoring_elements |
0.79427 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01269 |
| scoring_system |
epss |
| scoring_elements |
0.79476 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.01269 |
| scoring_system |
epss |
| scoring_elements |
0.79445 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.01269 |
| scoring_system |
epss |
| scoring_elements |
0.79473 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.01269 |
| scoring_system |
epss |
| scoring_elements |
0.79481 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.01269 |
| scoring_system |
epss |
| scoring_elements |
0.79503 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.01269 |
| scoring_system |
epss |
| scoring_elements |
0.79486 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.01269 |
| scoring_system |
epss |
| scoring_elements |
0.79434 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.01269 |
| scoring_system |
epss |
| scoring_elements |
0.79458 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-6476 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-6476
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cufc-v1hn-jbdn |
|
|
|
3.4
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.14.6-1
|
|
|
pkg:alpm/archlinux/bind@9.14.7-1
|
alpm
|
archlinux
|
bind
|
9.14.7-1
|
|
|
false
|
9.16.4-1
|
9.20.9-1
|
|
| 0 |
| url |
VCID-7mbz-t9jk-juca |
| vulnerability_id |
VCID-7mbz-t9jk-juca |
| summary |
bind: A flaw in mirror zone validity checking can allow zone data to be spoofed |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-6475 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00621 |
| scoring_system |
epss |
| scoring_elements |
0.70006 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00621 |
| scoring_system |
epss |
| scoring_elements |
0.70069 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00621 |
| scoring_system |
epss |
| scoring_elements |
0.70009 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00621 |
| scoring_system |
epss |
| scoring_elements |
0.70057 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00621 |
| scoring_system |
epss |
| scoring_elements |
0.70073 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00621 |
| scoring_system |
epss |
| scoring_elements |
0.70096 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00621 |
| scoring_system |
epss |
| scoring_elements |
0.70082 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00621 |
| scoring_system |
epss |
| scoring_elements |
0.70018 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00621 |
| scoring_system |
epss |
| scoring_elements |
0.70033 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-6475 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-6475
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7mbz-t9jk-juca |
|
| 1 |
| url |
VCID-cufc-v1hn-jbdn |
| vulnerability_id |
VCID-cufc-v1hn-jbdn |
| summary |
bind: An error in QNAME minimization code can cause BIND to exit with an assertion failure |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-6476 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01269 |
| scoring_system |
epss |
| scoring_elements |
0.79427 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01269 |
| scoring_system |
epss |
| scoring_elements |
0.79476 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.01269 |
| scoring_system |
epss |
| scoring_elements |
0.79445 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.01269 |
| scoring_system |
epss |
| scoring_elements |
0.79473 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.01269 |
| scoring_system |
epss |
| scoring_elements |
0.79481 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.01269 |
| scoring_system |
epss |
| scoring_elements |
0.79503 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.01269 |
| scoring_system |
epss |
| scoring_elements |
0.79486 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.01269 |
| scoring_system |
epss |
| scoring_elements |
0.79434 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.01269 |
| scoring_system |
epss |
| scoring_elements |
0.79458 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-6476 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-6476
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cufc-v1hn-jbdn |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.14.7-1
|
|
|
pkg:alpm/archlinux/bind@9.16.2-2
|
alpm
|
archlinux
|
bind
|
9.16.2-2
|
|
|
true
|
9.16.4-1
|
9.20.9-1
|
| 0 |
| url |
VCID-e5ez-2bba-zke3 |
| vulnerability_id |
VCID-e5ez-2bba-zke3 |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8617 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.89736 |
| scoring_system |
epss |
| scoring_elements |
0.99565 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.89736 |
| scoring_system |
epss |
| scoring_elements |
0.99566 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.89827 |
| scoring_system |
epss |
| scoring_elements |
0.99567 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.92629 |
| scoring_system |
epss |
| scoring_elements |
0.99745 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.92629 |
| scoring_system |
epss |
| scoring_elements |
0.99746 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8617 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8617
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e5ez-2bba-zke3 |
|
| 1 |
| url |
VCID-tg21-xnsh-t7c3 |
| vulnerability_id |
VCID-tg21-xnsh-t7c3 |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8616 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.1534 |
| scoring_system |
epss |
| scoring_elements |
0.946 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.1534 |
| scoring_system |
epss |
| scoring_elements |
0.94615 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.1534 |
| scoring_system |
epss |
| scoring_elements |
0.94608 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.19393 |
| scoring_system |
epss |
| scoring_elements |
0.9537 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.19393 |
| scoring_system |
epss |
| scoring_elements |
0.95373 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.19393 |
| scoring_system |
epss |
| scoring_elements |
0.95377 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.19393 |
| scoring_system |
epss |
| scoring_elements |
0.95363 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.19393 |
| scoring_system |
epss |
| scoring_elements |
0.9538 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8616 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8616
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tg21-xnsh-t7c3 |
|
|
|
10.0
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.16.2-2
|
|
|
pkg:alpm/archlinux/bind@9.16.3-1
|
alpm
|
archlinux
|
bind
|
9.16.3-1
|
|
|
true
|
9.16.4-1
|
9.20.9-1
|
| 0 |
| url |
VCID-gqmy-rkkq-mkgj |
| vulnerability_id |
VCID-gqmy-rkkq-mkgj |
| summary |
bind: A buffer boundary check assertion in rdataset.c can fail incorrectly during zone transfer |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8618 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.7965 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79698 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79721 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79704 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79656 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79678 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79664 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79692 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.797 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8618 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8618
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gqmy-rkkq-mkgj |
|
| 1 |
| url |
VCID-qknq-wu95-6ba7 |
| vulnerability_id |
VCID-qknq-wu95-6ba7 |
| summary |
bind: asterisk character in an empty non-terminal can cause an assertion failure in rbtdb.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8619 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.06931 |
| scoring_system |
epss |
| scoring_elements |
0.91367 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.06931 |
| scoring_system |
epss |
| scoring_elements |
0.91417 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.06931 |
| scoring_system |
epss |
| scoring_elements |
0.91415 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.06931 |
| scoring_system |
epss |
| scoring_elements |
0.91418 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.06931 |
| scoring_system |
epss |
| scoring_elements |
0.91373 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.06931 |
| scoring_system |
epss |
| scoring_elements |
0.91383 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.06931 |
| scoring_system |
epss |
| scoring_elements |
0.91391 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.06931 |
| scoring_system |
epss |
| scoring_elements |
0.91403 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.06931 |
| scoring_system |
epss |
| scoring_elements |
0.91409 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8619 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8619
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qknq-wu95-6ba7 |
|
|
| 0 |
| url |
VCID-e5ez-2bba-zke3 |
| vulnerability_id |
VCID-e5ez-2bba-zke3 |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8617 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.89736 |
| scoring_system |
epss |
| scoring_elements |
0.99565 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.89736 |
| scoring_system |
epss |
| scoring_elements |
0.99566 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.89827 |
| scoring_system |
epss |
| scoring_elements |
0.99567 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.92629 |
| scoring_system |
epss |
| scoring_elements |
0.99745 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.92629 |
| scoring_system |
epss |
| scoring_elements |
0.99746 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8617 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8617
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e5ez-2bba-zke3 |
|
| 1 |
| url |
VCID-tg21-xnsh-t7c3 |
| vulnerability_id |
VCID-tg21-xnsh-t7c3 |
| summary |
security update |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8616 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.1534 |
| scoring_system |
epss |
| scoring_elements |
0.946 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.1534 |
| scoring_system |
epss |
| scoring_elements |
0.94615 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.1534 |
| scoring_system |
epss |
| scoring_elements |
0.94608 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.19393 |
| scoring_system |
epss |
| scoring_elements |
0.9537 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.19393 |
| scoring_system |
epss |
| scoring_elements |
0.95373 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.19393 |
| scoring_system |
epss |
| scoring_elements |
0.95377 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.19393 |
| scoring_system |
epss |
| scoring_elements |
0.95363 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.19393 |
| scoring_system |
epss |
| scoring_elements |
0.9538 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8616 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8616
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tg21-xnsh-t7c3 |
|
|
3.1
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.16.3-1
|
|
|
pkg:alpm/archlinux/bind@9.16.4-1
|
alpm
|
archlinux
|
bind
|
9.16.4-1
|
|
|
false
|
9.16.12-1
|
9.20.9-1
|
|
| 0 |
| url |
VCID-gqmy-rkkq-mkgj |
| vulnerability_id |
VCID-gqmy-rkkq-mkgj |
| summary |
bind: A buffer boundary check assertion in rdataset.c can fail incorrectly during zone transfer |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8618 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.7965 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79698 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79721 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79704 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79656 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79678 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79664 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.79692 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.01297 |
| scoring_system |
epss |
| scoring_elements |
0.797 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8618 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8618
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gqmy-rkkq-mkgj |
|
| 1 |
| url |
VCID-qknq-wu95-6ba7 |
| vulnerability_id |
VCID-qknq-wu95-6ba7 |
| summary |
bind: asterisk character in an empty non-terminal can cause an assertion failure in rbtdb.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8619 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.06931 |
| scoring_system |
epss |
| scoring_elements |
0.91367 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.06931 |
| scoring_system |
epss |
| scoring_elements |
0.91417 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.06931 |
| scoring_system |
epss |
| scoring_elements |
0.91415 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.06931 |
| scoring_system |
epss |
| scoring_elements |
0.91418 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.06931 |
| scoring_system |
epss |
| scoring_elements |
0.91373 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.06931 |
| scoring_system |
epss |
| scoring_elements |
0.91383 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.06931 |
| scoring_system |
epss |
| scoring_elements |
0.91391 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.06931 |
| scoring_system |
epss |
| scoring_elements |
0.91403 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.06931 |
| scoring_system |
epss |
| scoring_elements |
0.91409 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8619 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8619
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qknq-wu95-6ba7 |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.16.4-1
|
|
|
pkg:alpm/archlinux/bind@9.16.11-1
|
alpm
|
archlinux
|
bind
|
9.16.11-1
|
|
|
true
|
9.16.12-1
|
9.20.9-1
|
| 0 |
| url |
VCID-4nrz-wm5t-z3g5 |
| vulnerability_id |
VCID-4nrz-wm5t-z3g5 |
| summary |
bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8625 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.26304 |
| scoring_system |
epss |
| scoring_elements |
0.96269 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.26304 |
| scoring_system |
epss |
| scoring_elements |
0.96308 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.26304 |
| scoring_system |
epss |
| scoring_elements |
0.96301 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.26304 |
| scoring_system |
epss |
| scoring_elements |
0.96305 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.26304 |
| scoring_system |
epss |
| scoring_elements |
0.96276 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.26304 |
| scoring_system |
epss |
| scoring_elements |
0.96284 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.26304 |
| scoring_system |
epss |
| scoring_elements |
0.96288 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.26304 |
| scoring_system |
epss |
| scoring_elements |
0.96297 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8625 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8625
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4nrz-wm5t-z3g5 |
|
|
|
4.0
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.16.11-1
|
|
|
pkg:alpm/archlinux/bind@9.16.12-1
|
alpm
|
archlinux
|
bind
|
9.16.12-1
|
|
|
false
|
9.16.15-1
|
9.20.9-1
|
|
| 0 |
| url |
VCID-4nrz-wm5t-z3g5 |
| vulnerability_id |
VCID-4nrz-wm5t-z3g5 |
| summary |
bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8625 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.26304 |
| scoring_system |
epss |
| scoring_elements |
0.96269 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.26304 |
| scoring_system |
epss |
| scoring_elements |
0.96308 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.26304 |
| scoring_system |
epss |
| scoring_elements |
0.96301 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.26304 |
| scoring_system |
epss |
| scoring_elements |
0.96305 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.26304 |
| scoring_system |
epss |
| scoring_elements |
0.96276 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.26304 |
| scoring_system |
epss |
| scoring_elements |
0.96284 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.26304 |
| scoring_system |
epss |
| scoring_elements |
0.96288 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.26304 |
| scoring_system |
epss |
| scoring_elements |
0.96297 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8625 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8625
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4nrz-wm5t-z3g5 |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.16.12-1
|
|
|
pkg:alpm/archlinux/bind@9.16.13-1
|
alpm
|
archlinux
|
bind
|
9.16.13-1
|
|
|
true
|
9.16.15-1
|
9.20.9-1
|
| 0 |
| url |
VCID-7kh5-ba54-z3gy |
| vulnerability_id |
VCID-7kh5-ba54-z3gy |
| summary |
bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-25215 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01493 |
| scoring_system |
epss |
| scoring_elements |
0.81002 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01493 |
| scoring_system |
epss |
| scoring_elements |
0.81066 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.01493 |
| scoring_system |
epss |
| scoring_elements |
0.81086 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.01493 |
| scoring_system |
epss |
| scoring_elements |
0.81073 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.01493 |
| scoring_system |
epss |
| scoring_elements |
0.81011 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.01493 |
| scoring_system |
epss |
| scoring_elements |
0.81035 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.01493 |
| scoring_system |
epss |
| scoring_elements |
0.81034 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.01493 |
| scoring_system |
epss |
| scoring_elements |
0.81062 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.01493 |
| scoring_system |
epss |
| scoring_elements |
0.81068 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-25215 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-25215
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7kh5-ba54-z3gy |
|
| 1 |
| url |
VCID-pjk7-r6yh-ufak |
| vulnerability_id |
VCID-pjk7-r6yh-ufak |
| summary |
bind: Broken inbound incremental zone update (IXFR) can cause named to terminate unexpectedly |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-25214 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00751 |
| scoring_system |
epss |
| scoring_elements |
0.73117 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00751 |
| scoring_system |
epss |
| scoring_elements |
0.73171 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00751 |
| scoring_system |
epss |
| scoring_elements |
0.73196 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00751 |
| scoring_system |
epss |
| scoring_elements |
0.73177 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00751 |
| scoring_system |
epss |
| scoring_elements |
0.73127 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00751 |
| scoring_system |
epss |
| scoring_elements |
0.73148 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00751 |
| scoring_system |
epss |
| scoring_elements |
0.73123 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00751 |
| scoring_system |
epss |
| scoring_elements |
0.73158 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00751 |
| scoring_system |
epss |
| scoring_elements |
0.73172 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-25214 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-25214
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pjk7-r6yh-ufak |
|
| 2 |
| url |
VCID-rd8n-tcus-zyg3 |
| vulnerability_id |
VCID-rd8n-tcus-zyg3 |
| summary |
bind: Vulnerability in BIND's GSSAPI security policy negotiation can be targeted by a buffer overflow attack |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-25216 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.27744 |
| scoring_system |
epss |
| scoring_elements |
0.96416 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.27744 |
| scoring_system |
epss |
| scoring_elements |
0.9645 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.27744 |
| scoring_system |
epss |
| scoring_elements |
0.96443 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.27744 |
| scoring_system |
epss |
| scoring_elements |
0.96447 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.27744 |
| scoring_system |
epss |
| scoring_elements |
0.96423 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.27744 |
| scoring_system |
epss |
| scoring_elements |
0.96427 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.27744 |
| scoring_system |
epss |
| scoring_elements |
0.96431 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.27744 |
| scoring_system |
epss |
| scoring_elements |
0.96439 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-25216 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-25216
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rd8n-tcus-zyg3 |
|
|
|
4.0
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.16.13-1
|
|
|
pkg:alpm/archlinux/bind@9.16.15-1
|
alpm
|
archlinux
|
bind
|
9.16.15-1
|
|
|
false
|
9.16.20-1
|
9.20.9-1
|
|
| 0 |
| url |
VCID-7kh5-ba54-z3gy |
| vulnerability_id |
VCID-7kh5-ba54-z3gy |
| summary |
bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-25215 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01493 |
| scoring_system |
epss |
| scoring_elements |
0.81002 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01493 |
| scoring_system |
epss |
| scoring_elements |
0.81066 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.01493 |
| scoring_system |
epss |
| scoring_elements |
0.81086 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.01493 |
| scoring_system |
epss |
| scoring_elements |
0.81073 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.01493 |
| scoring_system |
epss |
| scoring_elements |
0.81011 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.01493 |
| scoring_system |
epss |
| scoring_elements |
0.81035 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.01493 |
| scoring_system |
epss |
| scoring_elements |
0.81034 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.01493 |
| scoring_system |
epss |
| scoring_elements |
0.81062 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.01493 |
| scoring_system |
epss |
| scoring_elements |
0.81068 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-25215 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-25215
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7kh5-ba54-z3gy |
|
| 1 |
| url |
VCID-pjk7-r6yh-ufak |
| vulnerability_id |
VCID-pjk7-r6yh-ufak |
| summary |
bind: Broken inbound incremental zone update (IXFR) can cause named to terminate unexpectedly |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-25214 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00751 |
| scoring_system |
epss |
| scoring_elements |
0.73117 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00751 |
| scoring_system |
epss |
| scoring_elements |
0.73171 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00751 |
| scoring_system |
epss |
| scoring_elements |
0.73196 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00751 |
| scoring_system |
epss |
| scoring_elements |
0.73177 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00751 |
| scoring_system |
epss |
| scoring_elements |
0.73127 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00751 |
| scoring_system |
epss |
| scoring_elements |
0.73148 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00751 |
| scoring_system |
epss |
| scoring_elements |
0.73123 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00751 |
| scoring_system |
epss |
| scoring_elements |
0.73158 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00751 |
| scoring_system |
epss |
| scoring_elements |
0.73172 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-25214 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-25214
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pjk7-r6yh-ufak |
|
| 2 |
| url |
VCID-rd8n-tcus-zyg3 |
| vulnerability_id |
VCID-rd8n-tcus-zyg3 |
| summary |
bind: Vulnerability in BIND's GSSAPI security policy negotiation can be targeted by a buffer overflow attack |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-25216 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.27744 |
| scoring_system |
epss |
| scoring_elements |
0.96416 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.27744 |
| scoring_system |
epss |
| scoring_elements |
0.9645 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.27744 |
| scoring_system |
epss |
| scoring_elements |
0.96443 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.27744 |
| scoring_system |
epss |
| scoring_elements |
0.96447 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.27744 |
| scoring_system |
epss |
| scoring_elements |
0.96423 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.27744 |
| scoring_system |
epss |
| scoring_elements |
0.96427 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.27744 |
| scoring_system |
epss |
| scoring_elements |
0.96431 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.27744 |
| scoring_system |
epss |
| scoring_elements |
0.96439 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-25216 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-25216
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rd8n-tcus-zyg3 |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.16.15-1
|
|
|
pkg:alpm/archlinux/bind@9.16.19-1
|
alpm
|
archlinux
|
bind
|
9.16.19-1
|
|
|
true
|
9.16.20-1
|
9.20.9-1
|
| 0 |
| url |
VCID-x9g2-pnfe-qyhh |
| vulnerability_id |
VCID-x9g2-pnfe-qyhh |
| summary |
bind: Too strict assertion check could be triggered when responses require UDP fragmentation if RRL is in use |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-25218 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.68945 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.6901 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.69054 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.6904 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.68963 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.68983 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.68962 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.69013 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.69032 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-25218 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-25218
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x9g2-pnfe-qyhh |
|
|
|
3.4
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.16.19-1
|
|
|
pkg:alpm/archlinux/bind@9.16.20-1
|
alpm
|
archlinux
|
bind
|
9.16.20-1
|
|
|
false
|
9.16.22-1
|
9.20.9-1
|
|
| 0 |
| url |
VCID-x9g2-pnfe-qyhh |
| vulnerability_id |
VCID-x9g2-pnfe-qyhh |
| summary |
bind: Too strict assertion check could be triggered when responses require UDP fragmentation if RRL is in use |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-25218 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.68945 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.6901 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.69054 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.6904 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.68963 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.68983 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.68962 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.69013 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00584 |
| scoring_system |
epss |
| scoring_elements |
0.69032 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-25218 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-25218
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x9g2-pnfe-qyhh |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.16.20-1
|
|
|
pkg:alpm/archlinux/bind@9.16.21-1
|
alpm
|
archlinux
|
bind
|
9.16.21-1
|
|
|
true
|
9.16.22-1
|
9.20.9-1
|
| 0 |
| url |
VCID-8k3p-761z-f3e3 |
| vulnerability_id |
VCID-8k3p-761z-f3e3 |
| summary |
Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-25219 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00957 |
| scoring_system |
epss |
| scoring_elements |
0.76379 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00957 |
| scoring_system |
epss |
| scoring_elements |
0.76394 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00957 |
| scoring_system |
epss |
| scoring_elements |
0.76383 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00957 |
| scoring_system |
epss |
| scoring_elements |
0.76412 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00957 |
| scoring_system |
epss |
| scoring_elements |
0.76427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00957 |
| scoring_system |
epss |
| scoring_elements |
0.7644 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01039 |
| scoring_system |
epss |
| scoring_elements |
0.77425 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.01039 |
| scoring_system |
epss |
| scoring_elements |
0.77421 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.01039 |
| scoring_system |
epss |
| scoring_elements |
0.77445 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-25219 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-25219
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8k3p-761z-f3e3 |
|
|
|
3.1
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.16.21-1
|
|
|
pkg:alpm/archlinux/bind@9.16.22-1
|
alpm
|
archlinux
|
bind
|
9.16.22-1
|
|
|
false
|
9.18.1-1
|
9.20.9-1
|
|
| 0 |
| url |
VCID-8k3p-761z-f3e3 |
| vulnerability_id |
VCID-8k3p-761z-f3e3 |
| summary |
Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-25219 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00957 |
| scoring_system |
epss |
| scoring_elements |
0.76379 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00957 |
| scoring_system |
epss |
| scoring_elements |
0.76394 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00957 |
| scoring_system |
epss |
| scoring_elements |
0.76383 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00957 |
| scoring_system |
epss |
| scoring_elements |
0.76412 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00957 |
| scoring_system |
epss |
| scoring_elements |
0.76427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00957 |
| scoring_system |
epss |
| scoring_elements |
0.7644 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01039 |
| scoring_system |
epss |
| scoring_elements |
0.77425 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.01039 |
| scoring_system |
epss |
| scoring_elements |
0.77421 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.01039 |
| scoring_system |
epss |
| scoring_elements |
0.77445 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-25219 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-25219
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8k3p-761z-f3e3 |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.16.22-1
|
|
|
pkg:alpm/archlinux/bind@9.18.0-1
|
alpm
|
archlinux
|
bind
|
9.18.0-1
|
|
|
true
|
9.18.1-1
|
9.20.9-1
|
| 0 |
| url |
VCID-67zf-a3r9-wqcv |
| vulnerability_id |
VCID-67zf-a3r9-wqcv |
| summary |
Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-25220 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28459 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.2851 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.2855 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28551 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28509 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29013 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29079 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29153 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29202 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-25220 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-25220
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-67zf-a3r9-wqcv |
|
| 1 |
| url |
VCID-b3u2-wjzm-duhc |
| vulnerability_id |
VCID-b3u2-wjzm-duhc |
| summary |
bind: When chasing DS records, a timed-out or artificially delayed fetch could cause 'named' to crash while resuming a DS lookup |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0667 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00694 |
| scoring_system |
epss |
| scoring_elements |
0.71825 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00694 |
| scoring_system |
epss |
| scoring_elements |
0.71866 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00694 |
| scoring_system |
epss |
| scoring_elements |
0.71901 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00694 |
| scoring_system |
epss |
| scoring_elements |
0.71883 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00694 |
| scoring_system |
epss |
| scoring_elements |
0.71834 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00694 |
| scoring_system |
epss |
| scoring_elements |
0.71853 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00694 |
| scoring_system |
epss |
| scoring_elements |
0.71827 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00694 |
| scoring_system |
epss |
| scoring_elements |
0.71865 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00694 |
| scoring_system |
epss |
| scoring_elements |
0.71877 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0667 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0667
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b3u2-wjzm-duhc |
|
| 2 |
| url |
VCID-x4bu-4ex7-37cd |
| vulnerability_id |
VCID-x4bu-4ex7-37cd |
| summary |
bind: Lookups involving a DNAME could trigger an assertion failure when 'synth-from-dnssec' was enabled (which is the default) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0635 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00781 |
| scoring_system |
epss |
| scoring_elements |
0.73649 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00781 |
| scoring_system |
epss |
| scoring_elements |
0.73697 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00781 |
| scoring_system |
epss |
| scoring_elements |
0.73724 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00781 |
| scoring_system |
epss |
| scoring_elements |
0.73706 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00781 |
| scoring_system |
epss |
| scoring_elements |
0.73658 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00781 |
| scoring_system |
epss |
| scoring_elements |
0.73682 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00781 |
| scoring_system |
epss |
| scoring_elements |
0.73654 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00781 |
| scoring_system |
epss |
| scoring_elements |
0.7369 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00781 |
| scoring_system |
epss |
| scoring_elements |
0.73703 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0635 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0635
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x4bu-4ex7-37cd |
|
| 3 |
| url |
VCID-zgnn-ckqt-43fq |
| vulnerability_id |
VCID-zgnn-ckqt-43fq |
| summary |
Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0396 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28578 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.2853 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28623 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28579 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28665 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.2871 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28516 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28581 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28621 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0396 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0396
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zgnn-ckqt-43fq |
|
|
|
4.0
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.18.0-1
|
|
|
pkg:alpm/archlinux/bind@9.18.1-1
|
alpm
|
archlinux
|
bind
|
9.18.1-1
|
|
|
false
|
9.18.3-1
|
9.20.9-1
|
|
| 0 |
| url |
VCID-67zf-a3r9-wqcv |
| vulnerability_id |
VCID-67zf-a3r9-wqcv |
| summary |
Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-25220 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28459 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.2851 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.2855 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28551 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28509 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29013 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29079 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29153 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00108 |
| scoring_system |
epss |
| scoring_elements |
0.29202 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-25220 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-25220
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-67zf-a3r9-wqcv |
|
| 1 |
| url |
VCID-b3u2-wjzm-duhc |
| vulnerability_id |
VCID-b3u2-wjzm-duhc |
| summary |
bind: When chasing DS records, a timed-out or artificially delayed fetch could cause 'named' to crash while resuming a DS lookup |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0667 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00694 |
| scoring_system |
epss |
| scoring_elements |
0.71825 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00694 |
| scoring_system |
epss |
| scoring_elements |
0.71866 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00694 |
| scoring_system |
epss |
| scoring_elements |
0.71901 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00694 |
| scoring_system |
epss |
| scoring_elements |
0.71883 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00694 |
| scoring_system |
epss |
| scoring_elements |
0.71834 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00694 |
| scoring_system |
epss |
| scoring_elements |
0.71853 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00694 |
| scoring_system |
epss |
| scoring_elements |
0.71827 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00694 |
| scoring_system |
epss |
| scoring_elements |
0.71865 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00694 |
| scoring_system |
epss |
| scoring_elements |
0.71877 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0667 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0667
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b3u2-wjzm-duhc |
|
| 2 |
| url |
VCID-x4bu-4ex7-37cd |
| vulnerability_id |
VCID-x4bu-4ex7-37cd |
| summary |
bind: Lookups involving a DNAME could trigger an assertion failure when 'synth-from-dnssec' was enabled (which is the default) |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0635 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00781 |
| scoring_system |
epss |
| scoring_elements |
0.73649 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00781 |
| scoring_system |
epss |
| scoring_elements |
0.73697 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00781 |
| scoring_system |
epss |
| scoring_elements |
0.73724 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00781 |
| scoring_system |
epss |
| scoring_elements |
0.73706 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00781 |
| scoring_system |
epss |
| scoring_elements |
0.73658 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00781 |
| scoring_system |
epss |
| scoring_elements |
0.73682 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00781 |
| scoring_system |
epss |
| scoring_elements |
0.73654 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00781 |
| scoring_system |
epss |
| scoring_elements |
0.7369 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00781 |
| scoring_system |
epss |
| scoring_elements |
0.73703 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0635 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0635
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x4bu-4ex7-37cd |
|
| 3 |
| url |
VCID-zgnn-ckqt-43fq |
| vulnerability_id |
VCID-zgnn-ckqt-43fq |
| summary |
Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0396 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28578 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.2853 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28623 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28579 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28665 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.2871 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28516 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28581 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00105 |
| scoring_system |
epss |
| scoring_elements |
0.28621 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0396 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0396
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zgnn-ckqt-43fq |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.18.1-1
|
|
|
pkg:alpm/archlinux/bind@9.18.2-1
|
alpm
|
archlinux
|
bind
|
9.18.2-1
|
|
|
true
|
9.18.3-1
|
9.20.9-1
|
| 0 |
| url |
VCID-qhg8-95mf-aufj |
| vulnerability_id |
VCID-qhg8-95mf-aufj |
| summary |
bind: Destroying a TLS session early causes assertion failure |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1183 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60098 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60175 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60201 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.6017 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60219 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60234 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60255 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60241 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60224 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1183 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1183
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qhg8-95mf-aufj |
|
|
|
4.0
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.18.2-1
|
|
|
pkg:alpm/archlinux/bind@9.18.3-1
|
alpm
|
archlinux
|
bind
|
9.18.3-1
|
|
|
false
|
9.18.7-1
|
9.20.9-1
|
|
| 0 |
| url |
VCID-qhg8-95mf-aufj |
| vulnerability_id |
VCID-qhg8-95mf-aufj |
| summary |
bind: Destroying a TLS session early causes assertion failure |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1183 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60098 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60175 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60201 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.6017 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60219 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60234 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60255 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60241 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00392 |
| scoring_system |
epss |
| scoring_elements |
0.60224 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-1183 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-1183
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qhg8-95mf-aufj |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.18.3-1
|
|
|
pkg:alpm/archlinux/bind@9.18.6-1
|
alpm
|
archlinux
|
bind
|
9.18.6-1
|
|
|
true
|
9.18.7-1
|
9.20.9-1
|
| 0 |
| url |
VCID-hb26-udtw-6uhy |
| vulnerability_id |
VCID-hb26-udtw-6uhy |
| summary |
Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-38178 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01421 |
| scoring_system |
epss |
| scoring_elements |
0.80593 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.01421 |
| scoring_system |
epss |
| scoring_elements |
0.80545 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01421 |
| scoring_system |
epss |
| scoring_elements |
0.80567 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01421 |
| scoring_system |
epss |
| scoring_elements |
0.80559 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01421 |
| scoring_system |
epss |
| scoring_elements |
0.80588 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01421 |
| scoring_system |
epss |
| scoring_elements |
0.80597 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01421 |
| scoring_system |
epss |
| scoring_elements |
0.80614 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01421 |
| scoring_system |
epss |
| scoring_elements |
0.80601 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-38178 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-38178
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hb26-udtw-6uhy |
|
| 1 |
| url |
VCID-kpsw-dq9w-pkdr |
| vulnerability_id |
VCID-kpsw-dq9w-pkdr |
| summary |
Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-2795 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65706 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65669 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65699 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65665 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65716 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65728 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.6575 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65735 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-2795 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-2795
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kpsw-dq9w-pkdr |
|
| 2 |
| url |
VCID-rgz6-urkq-ybch |
| vulnerability_id |
VCID-rgz6-urkq-ybch |
| summary |
Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3080 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00109 |
| scoring_system |
epss |
| scoring_elements |
0.292 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00109 |
| scoring_system |
epss |
| scoring_elements |
0.29328 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00109 |
| scoring_system |
epss |
| scoring_elements |
0.29378 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00109 |
| scoring_system |
epss |
| scoring_elements |
0.2919 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00109 |
| scoring_system |
epss |
| scoring_elements |
0.29254 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00109 |
| scoring_system |
epss |
| scoring_elements |
0.29295 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00109 |
| scoring_system |
epss |
| scoring_elements |
0.29298 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00109 |
| scoring_system |
epss |
| scoring_elements |
0.29252 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3080 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-3080
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rgz6-urkq-ybch |
|
|
|
3.4
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.18.6-1
|
|
|
pkg:alpm/archlinux/bind@9.18.7-1
|
alpm
|
archlinux
|
bind
|
9.18.7-1
|
|
|
false
|
9.20.9-1
|
9.20.9-1
|
|
| 0 |
| url |
VCID-hb26-udtw-6uhy |
| vulnerability_id |
VCID-hb26-udtw-6uhy |
| summary |
Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-38178 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01421 |
| scoring_system |
epss |
| scoring_elements |
0.80593 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.01421 |
| scoring_system |
epss |
| scoring_elements |
0.80545 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01421 |
| scoring_system |
epss |
| scoring_elements |
0.80567 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01421 |
| scoring_system |
epss |
| scoring_elements |
0.80559 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01421 |
| scoring_system |
epss |
| scoring_elements |
0.80588 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01421 |
| scoring_system |
epss |
| scoring_elements |
0.80597 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01421 |
| scoring_system |
epss |
| scoring_elements |
0.80614 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01421 |
| scoring_system |
epss |
| scoring_elements |
0.80601 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-38178 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-38178
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hb26-udtw-6uhy |
|
| 1 |
| url |
VCID-kpsw-dq9w-pkdr |
| vulnerability_id |
VCID-kpsw-dq9w-pkdr |
| summary |
Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-2795 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65706 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65669 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65699 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65665 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65716 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65728 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.6575 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00493 |
| scoring_system |
epss |
| scoring_elements |
0.65735 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-2795 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-2795
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kpsw-dq9w-pkdr |
|
| 2 |
| url |
VCID-rgz6-urkq-ybch |
| vulnerability_id |
VCID-rgz6-urkq-ybch |
| summary |
Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3080 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00109 |
| scoring_system |
epss |
| scoring_elements |
0.292 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00109 |
| scoring_system |
epss |
| scoring_elements |
0.29328 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00109 |
| scoring_system |
epss |
| scoring_elements |
0.29378 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00109 |
| scoring_system |
epss |
| scoring_elements |
0.2919 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00109 |
| scoring_system |
epss |
| scoring_elements |
0.29254 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00109 |
| scoring_system |
epss |
| scoring_elements |
0.29295 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00109 |
| scoring_system |
epss |
| scoring_elements |
0.29298 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00109 |
| scoring_system |
epss |
| scoring_elements |
0.29252 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-3080 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-3080
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rgz6-urkq-ybch |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.18.7-1
|
|
|
pkg:alpm/archlinux/bind@9.20.8-2
|
alpm
|
archlinux
|
bind
|
9.20.8-2
|
|
|
true
|
9.20.9-1
|
9.20.9-1
|
| 0 |
| url |
VCID-nw9j-ggq9-uqaq |
| vulnerability_id |
VCID-nw9j-ggq9-uqaq |
| summary |
bind: DNS message with invalid TSIG causes an assertion failure |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-40775 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33915 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33884 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33769 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00181 |
| scoring_system |
epss |
| scoring_elements |
0.39862 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00181 |
| scoring_system |
epss |
| scoring_elements |
0.39845 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00181 |
| scoring_system |
epss |
| scoring_elements |
0.39873 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00181 |
| scoring_system |
epss |
| scoring_elements |
0.39887 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00181 |
| scoring_system |
epss |
| scoring_elements |
0.39896 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-40775 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-40775
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nw9j-ggq9-uqaq |
|
|
|
4.0
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.20.8-2
|
|
|
pkg:alpm/archlinux/bind@9.20.9-1
|
alpm
|
archlinux
|
bind
|
9.20.9-1
|
|
|
false
|
null
|
null
|
|
| 0 |
| url |
VCID-nw9j-ggq9-uqaq |
| vulnerability_id |
VCID-nw9j-ggq9-uqaq |
| summary |
bind: DNS message with invalid TSIG causes an assertion failure |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-40775 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33915 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33884 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00138 |
| scoring_system |
epss |
| scoring_elements |
0.33769 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00181 |
| scoring_system |
epss |
| scoring_elements |
0.39862 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00181 |
| scoring_system |
epss |
| scoring_elements |
0.39845 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00181 |
| scoring_system |
epss |
| scoring_elements |
0.39873 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00181 |
| scoring_system |
epss |
| scoring_elements |
0.39887 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00181 |
| scoring_system |
epss |
| scoring_elements |
0.39896 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-40775 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-40775
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nw9j-ggq9-uqaq |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bind@9.20.9-1
|
|
|
pkg:alpm/archlinux/binutils@2.26.0-1
|
alpm
|
archlinux
|
binutils
|
2.26.0-1
|
|
|
true
|
2.28.0-1
|
2.38-1
|
| 0 |
| url |
VCID-2p9v-kf9t-b7fs |
| vulnerability_id |
VCID-2p9v-kf9t-b7fs |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7224 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52812 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52896 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52878 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52928 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52912 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52839 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52865 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52833 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52884 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7224 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-7224
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2p9v-kf9t-b7fs |
|
| 1 |
| url |
VCID-cttr-nc15-jbb9 |
| vulnerability_id |
VCID-cttr-nc15-jbb9 |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7225 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00391 |
| scoring_system |
epss |
| scoring_elements |
0.60116 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00432 |
| scoring_system |
epss |
| scoring_elements |
0.6254 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00432 |
| scoring_system |
epss |
| scoring_elements |
0.62662 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00432 |
| scoring_system |
epss |
| scoring_elements |
0.6268 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00432 |
| scoring_system |
epss |
| scoring_elements |
0.62669 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00432 |
| scoring_system |
epss |
| scoring_elements |
0.62598 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00432 |
| scoring_system |
epss |
| scoring_elements |
0.62631 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00432 |
| scoring_system |
epss |
| scoring_elements |
0.62596 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00432 |
| scoring_system |
epss |
| scoring_elements |
0.62646 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7225 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-7225
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cttr-nc15-jbb9 |
|
| 2 |
| url |
VCID-ej6t-hx56-hbfe |
| vulnerability_id |
VCID-ej6t-hx56-hbfe |
| summary |
binutils: Heap-based buffer over-read in pe_ILF_object_p function in libbfd |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7226 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59321 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59434 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.5945 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59468 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59452 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59395 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.5942 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59385 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59436 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7226 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-7226
|
| risk_score |
4.1 |
| exploitability |
0.5 |
| weighted_severity |
8.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ej6t-hx56-hbfe |
|
| 3 |
| url |
VCID-qkjb-wje6-gkgr |
| vulnerability_id |
VCID-qkjb-wje6-gkgr |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7223 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.59919 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60043 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60055 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60076 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.6006 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.59996 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60021 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.59991 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60041 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7223 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-7223
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qkjb-wje6-gkgr |
|
|
|
4.1
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.26.0-1
|
|
|
pkg:alpm/archlinux/binutils@2.27.0-1
|
alpm
|
archlinux
|
binutils
|
2.27.0-1
|
|
|
true
|
2.28.0-1
|
2.38-1
|
| 0 |
| url |
VCID-325s-kx5s-97dj |
| vulnerability_id |
VCID-325s-kx5s-97dj |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7227 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0044 |
| scoring_system |
epss |
| scoring_elements |
0.63094 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0044 |
| scoring_system |
epss |
| scoring_elements |
0.63182 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.0044 |
| scoring_system |
epss |
| scoring_elements |
0.632 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.0044 |
| scoring_system |
epss |
| scoring_elements |
0.63218 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.0044 |
| scoring_system |
epss |
| scoring_elements |
0.63235 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.0044 |
| scoring_system |
epss |
| scoring_elements |
0.63219 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.0044 |
| scoring_system |
epss |
| scoring_elements |
0.63153 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.0044 |
| scoring_system |
epss |
| scoring_elements |
0.63183 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.0044 |
| scoring_system |
epss |
| scoring_elements |
0.63148 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7227 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-7227
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-325s-kx5s-97dj |
|
|
| 0 |
| url |
VCID-2p9v-kf9t-b7fs |
| vulnerability_id |
VCID-2p9v-kf9t-b7fs |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7224 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52812 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52896 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52878 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52928 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52912 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52839 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52865 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52833 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00296 |
| scoring_system |
epss |
| scoring_elements |
0.52884 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7224 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-7224
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2p9v-kf9t-b7fs |
|
| 1 |
| url |
VCID-cttr-nc15-jbb9 |
| vulnerability_id |
VCID-cttr-nc15-jbb9 |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7225 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00391 |
| scoring_system |
epss |
| scoring_elements |
0.60116 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00432 |
| scoring_system |
epss |
| scoring_elements |
0.6254 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00432 |
| scoring_system |
epss |
| scoring_elements |
0.62662 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00432 |
| scoring_system |
epss |
| scoring_elements |
0.6268 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00432 |
| scoring_system |
epss |
| scoring_elements |
0.62669 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00432 |
| scoring_system |
epss |
| scoring_elements |
0.62598 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00432 |
| scoring_system |
epss |
| scoring_elements |
0.62631 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00432 |
| scoring_system |
epss |
| scoring_elements |
0.62596 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00432 |
| scoring_system |
epss |
| scoring_elements |
0.62646 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7225 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-7225
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cttr-nc15-jbb9 |
|
| 2 |
| url |
VCID-ej6t-hx56-hbfe |
| vulnerability_id |
VCID-ej6t-hx56-hbfe |
| summary |
binutils: Heap-based buffer over-read in pe_ILF_object_p function in libbfd |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7226 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59321 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59434 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.5945 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59468 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59452 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59395 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.5942 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59385 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00379 |
| scoring_system |
epss |
| scoring_elements |
0.59436 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7226 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-7226
|
| risk_score |
4.1 |
| exploitability |
0.5 |
| weighted_severity |
8.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ej6t-hx56-hbfe |
|
| 3 |
| url |
VCID-qkjb-wje6-gkgr |
| vulnerability_id |
VCID-qkjb-wje6-gkgr |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7223 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.59919 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60043 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60055 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60076 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.6006 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.59996 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60021 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.59991 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.0039 |
| scoring_system |
epss |
| scoring_elements |
0.60041 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7223 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-7223
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qkjb-wje6-gkgr |
|
|
3.4
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.27.0-1
|
|
|
pkg:alpm/archlinux/binutils@2.28.0-1
|
alpm
|
archlinux
|
binutils
|
2.28.0-1
|
|
|
false
|
2.29.0-1
|
2.38-1
|
|
| 0 |
| url |
VCID-325s-kx5s-97dj |
| vulnerability_id |
VCID-325s-kx5s-97dj |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7227 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0044 |
| scoring_system |
epss |
| scoring_elements |
0.63094 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0044 |
| scoring_system |
epss |
| scoring_elements |
0.63182 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.0044 |
| scoring_system |
epss |
| scoring_elements |
0.632 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.0044 |
| scoring_system |
epss |
| scoring_elements |
0.63218 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.0044 |
| scoring_system |
epss |
| scoring_elements |
0.63235 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.0044 |
| scoring_system |
epss |
| scoring_elements |
0.63219 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.0044 |
| scoring_system |
epss |
| scoring_elements |
0.63153 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.0044 |
| scoring_system |
epss |
| scoring_elements |
0.63183 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.0044 |
| scoring_system |
epss |
| scoring_elements |
0.63148 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7227 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-7227
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-325s-kx5s-97dj |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.28.0-1
|
|
|
pkg:alpm/archlinux/binutils@2.28.0-4
|
alpm
|
archlinux
|
binutils
|
2.28.0-4
|
|
|
true
|
2.29.0-1
|
2.38-1
|
| 0 |
| url |
VCID-1rp7-5hxs-tqbx |
| vulnerability_id |
VCID-1rp7-5hxs-tqbx |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6965 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48609 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48672 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48624 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48678 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48674 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48692 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48666 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.4865 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52557 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6965 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-6965
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1rp7-5hxs-tqbx |
|
| 1 |
| url |
VCID-4ty8-8ecg-mqdy |
| vulnerability_id |
VCID-4ty8-8ecg-mqdy |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7209 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.5447 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54556 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54583 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54595 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54577 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54545 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54569 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54537 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54589 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7209 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-7209
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4ty8-8ecg-mqdy |
|
| 2 |
| url |
VCID-5cxe-ara7-jfcr |
| vulnerability_id |
VCID-5cxe-ara7-jfcr |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9041 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00483 |
| scoring_system |
epss |
| scoring_elements |
0.6513 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00483 |
| scoring_system |
epss |
| scoring_elements |
0.65211 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00483 |
| scoring_system |
epss |
| scoring_elements |
0.65233 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00483 |
| scoring_system |
epss |
| scoring_elements |
0.65251 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00483 |
| scoring_system |
epss |
| scoring_elements |
0.65239 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00483 |
| scoring_system |
epss |
| scoring_elements |
0.6518 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00483 |
| scoring_system |
epss |
| scoring_elements |
0.65205 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00483 |
| scoring_system |
epss |
| scoring_elements |
0.65171 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00483 |
| scoring_system |
epss |
| scoring_elements |
0.65221 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9041 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-9041
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5cxe-ara7-jfcr |
|
| 3 |
| url |
VCID-b5je-gm19-yba5 |
| vulnerability_id |
VCID-b5je-gm19-yba5 |
| summary |
binutils: Out-of-bounds read in the print_symbol_for_build_attribute function |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9044 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00317 |
| scoring_system |
epss |
| scoring_elements |
0.54763 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00421 |
| scoring_system |
epss |
| scoring_elements |
0.61848 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00421 |
| scoring_system |
epss |
| scoring_elements |
0.6201 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00421 |
| scoring_system |
epss |
| scoring_elements |
0.61999 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00421 |
| scoring_system |
epss |
| scoring_elements |
0.61921 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00421 |
| scoring_system |
epss |
| scoring_elements |
0.61951 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00421 |
| scoring_system |
epss |
| scoring_elements |
0.61971 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00421 |
| scoring_system |
epss |
| scoring_elements |
0.61988 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9044 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-9044
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b5je-gm19-yba5 |
|
| 4 |
| url |
VCID-dyx7-6xgz-mqa7 |
| vulnerability_id |
VCID-dyx7-6xgz-mqa7 |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9038 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.57909 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58021 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58063 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58042 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.57993 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58013 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.57988 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58043 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58046 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9038 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-9038
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dyx7-6xgz-mqa7 |
|
| 5 |
| url |
VCID-j2wc-yxrx-4kh6 |
| vulnerability_id |
VCID-j2wc-yxrx-4kh6 |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9040 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58021 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64702 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64809 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64826 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64816 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64754 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64782 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64745 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64795 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9040 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-9040
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j2wc-yxrx-4kh6 |
|
| 6 |
| url |
VCID-kzqn-frns-jyab |
| vulnerability_id |
VCID-kzqn-frns-jyab |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6966 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51154 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51251 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51243 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51287 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51265 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51207 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51232 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51191 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51246 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6966 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-6966
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kzqn-frns-jyab |
|
| 7 |
| url |
VCID-mgmr-bkuv-sbba |
| vulnerability_id |
VCID-mgmr-bkuv-sbba |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7210 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.5447 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54556 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54583 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54595 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54577 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54545 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54569 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54537 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54589 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7210 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-7210
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mgmr-bkuv-sbba |
|
| 8 |
| url |
VCID-n93p-dptt-r3hg |
| vulnerability_id |
VCID-n93p-dptt-r3hg |
| summary |
binutils: Shift exponent too large for type unsigned long in readelf.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9043 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60219 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60295 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.6032 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60288 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60375 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60361 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60338 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60354 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00471 |
| scoring_system |
epss |
| scoring_elements |
0.64622 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9043 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-9043
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n93p-dptt-r3hg |
|
| 9 |
| url |
VCID-qnnr-5t4r-xfdc |
| vulnerability_id |
VCID-qnnr-5t4r-xfdc |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6969 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00455 |
| scoring_system |
epss |
| scoring_elements |
0.63754 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00455 |
| scoring_system |
epss |
| scoring_elements |
0.63834 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00455 |
| scoring_system |
epss |
| scoring_elements |
0.63868 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00455 |
| scoring_system |
epss |
| scoring_elements |
0.63881 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00455 |
| scoring_system |
epss |
| scoring_elements |
0.63867 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00455 |
| scoring_system |
epss |
| scoring_elements |
0.63816 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00455 |
| scoring_system |
epss |
| scoring_elements |
0.63842 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00455 |
| scoring_system |
epss |
| scoring_elements |
0.63799 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00455 |
| scoring_system |
epss |
| scoring_elements |
0.6385 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6969 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-6969
|
| risk_score |
4.1 |
| exploitability |
0.5 |
| weighted_severity |
8.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qnnr-5t4r-xfdc |
|
| 10 |
| url |
VCID-qv6w-s2tv-eyfs |
| vulnerability_id |
VCID-qv6w-s2tv-eyfs |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9039 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.57909 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58021 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58046 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58063 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58042 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.57993 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58013 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.57988 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58043 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9039 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-9039
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qv6w-s2tv-eyfs |
|
| 11 |
| url |
VCID-z7m5-hqbr-abc2 |
| vulnerability_id |
VCID-z7m5-hqbr-abc2 |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9042 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60219 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60342 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60354 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60375 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60361 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60295 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.6032 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60288 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60338 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9042 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-9042
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-z7m5-hqbr-abc2 |
|
|
|
4.1
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.28.0-4
|
|
|
pkg:alpm/archlinux/binutils@2.29.0-1
|
alpm
|
archlinux
|
binutils
|
2.29.0-1
|
|
|
false
|
2.30-1
|
2.38-1
|
|
| 0 |
| url |
VCID-1rp7-5hxs-tqbx |
| vulnerability_id |
VCID-1rp7-5hxs-tqbx |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6965 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48609 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48672 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48624 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48678 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48674 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48692 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.48666 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00254 |
| scoring_system |
epss |
| scoring_elements |
0.4865 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00292 |
| scoring_system |
epss |
| scoring_elements |
0.52557 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6965 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-6965
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1rp7-5hxs-tqbx |
|
| 1 |
| url |
VCID-4ty8-8ecg-mqdy |
| vulnerability_id |
VCID-4ty8-8ecg-mqdy |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7209 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.5447 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54556 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54583 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54595 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54577 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54545 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54569 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54537 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54589 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7209 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-7209
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4ty8-8ecg-mqdy |
|
| 2 |
| url |
VCID-5cxe-ara7-jfcr |
| vulnerability_id |
VCID-5cxe-ara7-jfcr |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9041 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00483 |
| scoring_system |
epss |
| scoring_elements |
0.6513 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00483 |
| scoring_system |
epss |
| scoring_elements |
0.65211 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00483 |
| scoring_system |
epss |
| scoring_elements |
0.65233 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00483 |
| scoring_system |
epss |
| scoring_elements |
0.65251 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00483 |
| scoring_system |
epss |
| scoring_elements |
0.65239 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00483 |
| scoring_system |
epss |
| scoring_elements |
0.6518 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00483 |
| scoring_system |
epss |
| scoring_elements |
0.65205 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00483 |
| scoring_system |
epss |
| scoring_elements |
0.65171 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00483 |
| scoring_system |
epss |
| scoring_elements |
0.65221 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9041 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-9041
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5cxe-ara7-jfcr |
|
| 3 |
| url |
VCID-b5je-gm19-yba5 |
| vulnerability_id |
VCID-b5je-gm19-yba5 |
| summary |
binutils: Out-of-bounds read in the print_symbol_for_build_attribute function |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9044 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00317 |
| scoring_system |
epss |
| scoring_elements |
0.54763 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00421 |
| scoring_system |
epss |
| scoring_elements |
0.61848 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00421 |
| scoring_system |
epss |
| scoring_elements |
0.6201 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00421 |
| scoring_system |
epss |
| scoring_elements |
0.61999 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00421 |
| scoring_system |
epss |
| scoring_elements |
0.61921 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00421 |
| scoring_system |
epss |
| scoring_elements |
0.61951 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00421 |
| scoring_system |
epss |
| scoring_elements |
0.61971 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00421 |
| scoring_system |
epss |
| scoring_elements |
0.61988 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9044 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-9044
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b5je-gm19-yba5 |
|
| 4 |
| url |
VCID-dyx7-6xgz-mqa7 |
| vulnerability_id |
VCID-dyx7-6xgz-mqa7 |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9038 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.57909 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58021 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58063 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58042 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.57993 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58013 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.57988 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58043 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58046 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9038 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-9038
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dyx7-6xgz-mqa7 |
|
| 5 |
| url |
VCID-j2wc-yxrx-4kh6 |
| vulnerability_id |
VCID-j2wc-yxrx-4kh6 |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9040 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58021 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64702 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64809 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64826 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64816 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64754 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64782 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64745 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64795 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9040 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-9040
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j2wc-yxrx-4kh6 |
|
| 6 |
| url |
VCID-kzqn-frns-jyab |
| vulnerability_id |
VCID-kzqn-frns-jyab |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6966 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51154 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51251 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51243 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51287 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51265 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51207 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51232 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51191 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00278 |
| scoring_system |
epss |
| scoring_elements |
0.51246 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6966 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-6966
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kzqn-frns-jyab |
|
| 7 |
| url |
VCID-mgmr-bkuv-sbba |
| vulnerability_id |
VCID-mgmr-bkuv-sbba |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7210 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.5447 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54556 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54583 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54595 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54577 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54545 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54569 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54537 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54589 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7210 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-7210
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mgmr-bkuv-sbba |
|
| 8 |
| url |
VCID-n93p-dptt-r3hg |
| vulnerability_id |
VCID-n93p-dptt-r3hg |
| summary |
binutils: Shift exponent too large for type unsigned long in readelf.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9043 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60219 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60295 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.6032 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60288 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60375 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60361 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60338 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60354 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00471 |
| scoring_system |
epss |
| scoring_elements |
0.64622 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9043 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-9043
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n93p-dptt-r3hg |
|
| 9 |
| url |
VCID-qnnr-5t4r-xfdc |
| vulnerability_id |
VCID-qnnr-5t4r-xfdc |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6969 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00455 |
| scoring_system |
epss |
| scoring_elements |
0.63754 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00455 |
| scoring_system |
epss |
| scoring_elements |
0.63834 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00455 |
| scoring_system |
epss |
| scoring_elements |
0.63868 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00455 |
| scoring_system |
epss |
| scoring_elements |
0.63881 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00455 |
| scoring_system |
epss |
| scoring_elements |
0.63867 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00455 |
| scoring_system |
epss |
| scoring_elements |
0.63816 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00455 |
| scoring_system |
epss |
| scoring_elements |
0.63842 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00455 |
| scoring_system |
epss |
| scoring_elements |
0.63799 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00455 |
| scoring_system |
epss |
| scoring_elements |
0.6385 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-6969 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-6969
|
| risk_score |
4.1 |
| exploitability |
0.5 |
| weighted_severity |
8.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qnnr-5t4r-xfdc |
|
| 10 |
| url |
VCID-qv6w-s2tv-eyfs |
| vulnerability_id |
VCID-qv6w-s2tv-eyfs |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9039 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.57909 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58021 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58046 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58063 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58042 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.57993 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58013 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.57988 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00358 |
| scoring_system |
epss |
| scoring_elements |
0.58043 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9039 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-9039
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qv6w-s2tv-eyfs |
|
| 11 |
| url |
VCID-z7m5-hqbr-abc2 |
| vulnerability_id |
VCID-z7m5-hqbr-abc2 |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9042 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60219 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60342 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60354 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60375 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60361 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60295 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.6032 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60288 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00395 |
| scoring_system |
epss |
| scoring_elements |
0.60338 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-9042 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-9042
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-z7m5-hqbr-abc2 |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.29.0-1
|
|
|
pkg:alpm/archlinux/binutils@2.29.1-3
|
alpm
|
archlinux
|
binutils
|
2.29.1-3
|
|
|
true
|
2.30-1
|
2.38-1
|
| 0 |
| url |
VCID-3aht-pk4j-b3h5 |
| vulnerability_id |
VCID-3aht-pk4j-b3h5 |
| summary |
binutils: NULL pointer dereference in dwarf2.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15022 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49383 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49433 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49392 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49447 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49442 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49459 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.4943 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49412 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49439 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15022 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-15022
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3aht-pk4j-b3h5 |
|
| 1 |
| url |
VCID-3az2-jj9s-7ffj |
| vulnerability_id |
VCID-3az2-jj9s-7ffj |
| summary |
binutils: Infinite recursion in find_abstract_instance_name |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15024 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62103 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62216 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62162 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62212 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62229 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62247 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62237 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62163 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62194 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15024 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-15024
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3az2-jj9s-7ffj |
|
| 2 |
| url |
VCID-6atd-3q2h-vfd5 |
| vulnerability_id |
VCID-6atd-3q2h-vfd5 |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17123 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63166 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63254 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.6322 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63272 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63289 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63306 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.6329 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63225 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63255 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17123 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-17123
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6atd-3q2h-vfd5 |
|
| 3 |
| url |
VCID-92ag-7zjf-qfhj |
| vulnerability_id |
VCID-92ag-7zjf-qfhj |
| summary |
binutils: Divide-by-zero in decode_line_info |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15025 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49383 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49433 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49392 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49447 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49442 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49459 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.4943 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49412 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49439 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15025 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-15025
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-92ag-7zjf-qfhj |
|
| 4 |
| url |
VCID-b7ed-5vy7-8yb8 |
| vulnerability_id |
VCID-b7ed-5vy7-8yb8 |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17124 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00387 |
| scoring_system |
epss |
| scoring_elements |
0.5971 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00387 |
| scoring_system |
epss |
| scoring_elements |
0.59846 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00387 |
| scoring_system |
epss |
| scoring_elements |
0.59807 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00387 |
| scoring_system |
epss |
| scoring_elements |
0.59777 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00387 |
| scoring_system |
epss |
| scoring_elements |
0.59828 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00387 |
| scoring_system |
epss |
| scoring_elements |
0.59842 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00387 |
| scoring_system |
epss |
| scoring_elements |
0.59862 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00387 |
| scoring_system |
epss |
| scoring_elements |
0.59783 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17124 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-17124
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b7ed-5vy7-8yb8 |
|
| 5 |
| url |
VCID-bah7-vbh3-7ueg |
| vulnerability_id |
VCID-bah7-vbh3-7ueg |
| summary |
binutils: Heap-based buffer over-read in bfd_get_debug_link_info_1 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15021 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49383 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49433 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49392 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49447 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49442 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49459 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.4943 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49412 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49439 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15021 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-15021
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bah7-vbh3-7ueg |
|
| 6 |
| url |
VCID-csfh-sngk-qfga |
| vulnerability_id |
VCID-csfh-sngk-qfga |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17126 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59129 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59241 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59192 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59244 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59257 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59277 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.5926 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59203 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59227 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17126 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-17126
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-csfh-sngk-qfga |
|
| 7 |
| url |
VCID-e2yq-7v8c-z7hk |
| vulnerability_id |
VCID-e2yq-7v8c-z7hk |
| summary |
binutils: Heap-based buffer overflow in parse_die |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15020 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00144 |
| scoring_system |
epss |
| scoring_elements |
0.34608 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00144 |
| scoring_system |
epss |
| scoring_elements |
0.34737 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00144 |
| scoring_system |
epss |
| scoring_elements |
0.34726 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00144 |
| scoring_system |
epss |
| scoring_elements |
0.34769 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00144 |
| scoring_system |
epss |
| scoring_elements |
0.34797 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00144 |
| scoring_system |
epss |
| scoring_elements |
0.34801 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00144 |
| scoring_system |
epss |
| scoring_elements |
0.34762 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00144 |
| scoring_system |
epss |
| scoring_elements |
0.34823 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00144 |
| scoring_system |
epss |
| scoring_elements |
0.3485 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15020 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-15020
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e2yq-7v8c-z7hk |
|
| 8 |
| url |
VCID-ftnk-2drc-jkdw |
| vulnerability_id |
VCID-ftnk-2drc-jkdw |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17122 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62141 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62251 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62198 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62247 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62265 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62283 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62273 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62201 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62231 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17122 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-17122
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ftnk-2drc-jkdw |
|
| 9 |
| url |
VCID-mann-686a-8bec |
| vulnerability_id |
VCID-mann-686a-8bec |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15023 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00489 |
| scoring_system |
epss |
| scoring_elements |
0.65455 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00489 |
| scoring_system |
epss |
| scoring_elements |
0.65538 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00489 |
| scoring_system |
epss |
| scoring_elements |
0.65496 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00489 |
| scoring_system |
epss |
| scoring_elements |
0.65549 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00489 |
| scoring_system |
epss |
| scoring_elements |
0.6556 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00489 |
| scoring_system |
epss |
| scoring_elements |
0.65579 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00489 |
| scoring_system |
epss |
| scoring_elements |
0.65566 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00489 |
| scoring_system |
epss |
| scoring_elements |
0.65504 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00489 |
| scoring_system |
epss |
| scoring_elements |
0.65532 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15023 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-15023
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mann-686a-8bec |
|
| 10 |
| url |
VCID-stn9-gqqb-7kae |
| vulnerability_id |
VCID-stn9-gqqb-7kae |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17125 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59129 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59241 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59192 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59244 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59257 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59277 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.5926 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59203 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59227 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17125 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-17125
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-stn9-gqqb-7kae |
|
| 11 |
| url |
VCID-yqbv-z58c-dycr |
| vulnerability_id |
VCID-yqbv-z58c-dycr |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15996 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54475 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54561 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54594 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54589 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54601 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54583 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.5455 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54574 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54543 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15996 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-15996
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yqbv-z58c-dycr |
|
|
|
4.0
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.29.1-3
|
|
|
pkg:alpm/archlinux/binutils@2.30-1
|
alpm
|
archlinux
|
binutils
|
2.30-1
|
|
|
false
|
2.32-1
|
2.38-1
|
|
| 0 |
| url |
VCID-3aht-pk4j-b3h5 |
| vulnerability_id |
VCID-3aht-pk4j-b3h5 |
| summary |
binutils: NULL pointer dereference in dwarf2.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15022 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49383 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49433 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49392 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49447 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49442 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49459 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.4943 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49412 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49439 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15022 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-15022
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3aht-pk4j-b3h5 |
|
| 1 |
| url |
VCID-3az2-jj9s-7ffj |
| vulnerability_id |
VCID-3az2-jj9s-7ffj |
| summary |
binutils: Infinite recursion in find_abstract_instance_name |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15024 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62103 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62216 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62162 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62212 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62229 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62247 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62237 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62163 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00425 |
| scoring_system |
epss |
| scoring_elements |
0.62194 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15024 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-15024
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3az2-jj9s-7ffj |
|
| 2 |
| url |
VCID-6atd-3q2h-vfd5 |
| vulnerability_id |
VCID-6atd-3q2h-vfd5 |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17123 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63166 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63254 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.6322 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63272 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63289 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63306 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.6329 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63225 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00442 |
| scoring_system |
epss |
| scoring_elements |
0.63255 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17123 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-17123
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6atd-3q2h-vfd5 |
|
| 3 |
| url |
VCID-92ag-7zjf-qfhj |
| vulnerability_id |
VCID-92ag-7zjf-qfhj |
| summary |
binutils: Divide-by-zero in decode_line_info |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15025 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49383 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49433 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49392 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49447 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49442 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49459 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.4943 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49412 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49439 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15025 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-15025
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-92ag-7zjf-qfhj |
|
| 4 |
| url |
VCID-b7ed-5vy7-8yb8 |
| vulnerability_id |
VCID-b7ed-5vy7-8yb8 |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17124 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00387 |
| scoring_system |
epss |
| scoring_elements |
0.5971 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00387 |
| scoring_system |
epss |
| scoring_elements |
0.59846 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00387 |
| scoring_system |
epss |
| scoring_elements |
0.59807 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00387 |
| scoring_system |
epss |
| scoring_elements |
0.59777 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00387 |
| scoring_system |
epss |
| scoring_elements |
0.59828 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00387 |
| scoring_system |
epss |
| scoring_elements |
0.59842 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00387 |
| scoring_system |
epss |
| scoring_elements |
0.59862 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00387 |
| scoring_system |
epss |
| scoring_elements |
0.59783 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17124 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-17124
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b7ed-5vy7-8yb8 |
|
| 5 |
| url |
VCID-bah7-vbh3-7ueg |
| vulnerability_id |
VCID-bah7-vbh3-7ueg |
| summary |
binutils: Heap-based buffer over-read in bfd_get_debug_link_info_1 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15021 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49383 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49433 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49392 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49447 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49442 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49459 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.4943 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49412 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00261 |
| scoring_system |
epss |
| scoring_elements |
0.49439 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15021 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-15021
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bah7-vbh3-7ueg |
|
| 6 |
| url |
VCID-csfh-sngk-qfga |
| vulnerability_id |
VCID-csfh-sngk-qfga |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17126 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59129 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59241 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59192 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59244 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59257 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59277 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.5926 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59203 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59227 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17126 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-17126
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-csfh-sngk-qfga |
|
| 7 |
| url |
VCID-e2yq-7v8c-z7hk |
| vulnerability_id |
VCID-e2yq-7v8c-z7hk |
| summary |
binutils: Heap-based buffer overflow in parse_die |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15020 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00144 |
| scoring_system |
epss |
| scoring_elements |
0.34608 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00144 |
| scoring_system |
epss |
| scoring_elements |
0.34737 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00144 |
| scoring_system |
epss |
| scoring_elements |
0.34726 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00144 |
| scoring_system |
epss |
| scoring_elements |
0.34769 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00144 |
| scoring_system |
epss |
| scoring_elements |
0.34797 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00144 |
| scoring_system |
epss |
| scoring_elements |
0.34801 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00144 |
| scoring_system |
epss |
| scoring_elements |
0.34762 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00144 |
| scoring_system |
epss |
| scoring_elements |
0.34823 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00144 |
| scoring_system |
epss |
| scoring_elements |
0.3485 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15020 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-15020
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-e2yq-7v8c-z7hk |
|
| 8 |
| url |
VCID-ftnk-2drc-jkdw |
| vulnerability_id |
VCID-ftnk-2drc-jkdw |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17122 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62141 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62251 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62198 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62247 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62265 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62283 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62273 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62201 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00426 |
| scoring_system |
epss |
| scoring_elements |
0.62231 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17122 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-17122
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ftnk-2drc-jkdw |
|
| 9 |
| url |
VCID-mann-686a-8bec |
| vulnerability_id |
VCID-mann-686a-8bec |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15023 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00489 |
| scoring_system |
epss |
| scoring_elements |
0.65455 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00489 |
| scoring_system |
epss |
| scoring_elements |
0.65538 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00489 |
| scoring_system |
epss |
| scoring_elements |
0.65496 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00489 |
| scoring_system |
epss |
| scoring_elements |
0.65549 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00489 |
| scoring_system |
epss |
| scoring_elements |
0.6556 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00489 |
| scoring_system |
epss |
| scoring_elements |
0.65579 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00489 |
| scoring_system |
epss |
| scoring_elements |
0.65566 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00489 |
| scoring_system |
epss |
| scoring_elements |
0.65504 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00489 |
| scoring_system |
epss |
| scoring_elements |
0.65532 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15023 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-15023
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mann-686a-8bec |
|
| 10 |
| url |
VCID-stn9-gqqb-7kae |
| vulnerability_id |
VCID-stn9-gqqb-7kae |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17125 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59129 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59241 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59192 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59244 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59257 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59277 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.5926 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59203 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59227 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-17125 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-17125
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-stn9-gqqb-7kae |
|
| 11 |
| url |
VCID-yqbv-z58c-dycr |
| vulnerability_id |
VCID-yqbv-z58c-dycr |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15996 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54475 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54561 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54594 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54589 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54601 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54583 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.5455 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54574 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00314 |
| scoring_system |
epss |
| scoring_elements |
0.54543 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15996 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-15996
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yqbv-z58c-dycr |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.30-1
|
|
|
pkg:alpm/archlinux/binutils@2.31.1-4
|
alpm
|
archlinux
|
binutils
|
2.31.1-4
|
|
|
true
|
2.32-1
|
2.38-1
|
| 0 |
| url |
VCID-24yc-9zfd-skax |
| vulnerability_id |
VCID-24yc-9zfd-skax |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19932 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61829 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61958 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.6199 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61979 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61902 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61932 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61951 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61969 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19932 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-19932
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-24yc-9zfd-skax |
|
| 1 |
| url |
VCID-98ww-99gn-xyar |
| vulnerability_id |
VCID-98ww-99gn-xyar |
| summary |
libiberty: heap-based buffer over-read in d_expression_1 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20712 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00801 |
| scoring_system |
epss |
| scoring_elements |
0.74019 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00801 |
| scoring_system |
epss |
| scoring_elements |
0.74067 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00801 |
| scoring_system |
epss |
| scoring_elements |
0.74056 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00801 |
| scoring_system |
epss |
| scoring_elements |
0.7407 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00801 |
| scoring_system |
epss |
| scoring_elements |
0.74092 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00801 |
| scoring_system |
epss |
| scoring_elements |
0.74074 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00801 |
| scoring_system |
epss |
| scoring_elements |
0.74025 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00801 |
| scoring_system |
epss |
| scoring_elements |
0.74051 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00801 |
| scoring_system |
epss |
| scoring_elements |
0.74022 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20712 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-20712
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-98ww-99gn-xyar |
|
| 2 |
| url |
VCID-kuzy-t7d8-kfhd |
| vulnerability_id |
VCID-kuzy-t7d8-kfhd |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19931 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55027 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55151 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55188 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55169 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55128 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55152 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55127 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55177 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19931 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-19931
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kuzy-t7d8-kfhd |
|
| 3 |
| url |
VCID-w17q-m7sf-23fx |
| vulnerability_id |
VCID-w17q-m7sf-23fx |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20002 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00315 |
| scoring_system |
epss |
| scoring_elements |
0.54537 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00315 |
| scoring_system |
epss |
| scoring_elements |
0.54598 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00315 |
| scoring_system |
epss |
| scoring_elements |
0.54645 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00315 |
| scoring_system |
epss |
| scoring_elements |
0.54658 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00315 |
| scoring_system |
epss |
| scoring_elements |
0.5464 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00315 |
| scoring_system |
epss |
| scoring_elements |
0.54607 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00315 |
| scoring_system |
epss |
| scoring_elements |
0.5463 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00315 |
| scoring_system |
epss |
| scoring_elements |
0.5465 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.0033 |
| scoring_system |
epss |
| scoring_elements |
0.55957 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20002 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-20002
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-w17q-m7sf-23fx |
|
|
|
4.0
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.31.1-4
|
|
|
pkg:alpm/archlinux/binutils@2.32-1
|
alpm
|
archlinux
|
binutils
|
2.32-1
|
|
|
false
|
2.36-1
|
2.38-1
|
|
| 0 |
| url |
VCID-24yc-9zfd-skax |
| vulnerability_id |
VCID-24yc-9zfd-skax |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19932 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61829 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61958 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.6199 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61979 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61902 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61932 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61951 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.0042 |
| scoring_system |
epss |
| scoring_elements |
0.61969 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19932 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-19932
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-24yc-9zfd-skax |
|
| 1 |
| url |
VCID-98ww-99gn-xyar |
| vulnerability_id |
VCID-98ww-99gn-xyar |
| summary |
libiberty: heap-based buffer over-read in d_expression_1 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20712 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00801 |
| scoring_system |
epss |
| scoring_elements |
0.74019 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00801 |
| scoring_system |
epss |
| scoring_elements |
0.74067 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00801 |
| scoring_system |
epss |
| scoring_elements |
0.74056 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00801 |
| scoring_system |
epss |
| scoring_elements |
0.7407 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00801 |
| scoring_system |
epss |
| scoring_elements |
0.74092 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00801 |
| scoring_system |
epss |
| scoring_elements |
0.74074 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00801 |
| scoring_system |
epss |
| scoring_elements |
0.74025 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00801 |
| scoring_system |
epss |
| scoring_elements |
0.74051 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00801 |
| scoring_system |
epss |
| scoring_elements |
0.74022 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20712 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-20712
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-98ww-99gn-xyar |
|
| 2 |
| url |
VCID-kuzy-t7d8-kfhd |
| vulnerability_id |
VCID-kuzy-t7d8-kfhd |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19931 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55027 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55151 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55188 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55169 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55128 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55152 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55127 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55177 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19931 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-19931
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kuzy-t7d8-kfhd |
|
| 3 |
| url |
VCID-w17q-m7sf-23fx |
| vulnerability_id |
VCID-w17q-m7sf-23fx |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which may allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20002 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00315 |
| scoring_system |
epss |
| scoring_elements |
0.54537 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00315 |
| scoring_system |
epss |
| scoring_elements |
0.54598 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00315 |
| scoring_system |
epss |
| scoring_elements |
0.54645 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00315 |
| scoring_system |
epss |
| scoring_elements |
0.54658 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00315 |
| scoring_system |
epss |
| scoring_elements |
0.5464 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00315 |
| scoring_system |
epss |
| scoring_elements |
0.54607 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00315 |
| scoring_system |
epss |
| scoring_elements |
0.5463 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00315 |
| scoring_system |
epss |
| scoring_elements |
0.5465 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.0033 |
| scoring_system |
epss |
| scoring_elements |
0.55957 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-20002 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-20002
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-w17q-m7sf-23fx |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.32-1
|
|
|
pkg:alpm/archlinux/binutils@2.35.1-1
|
alpm
|
archlinux
|
binutils
|
2.35.1-1
|
|
|
true
|
2.36-1
|
2.38-1
|
| 0 |
| url |
VCID-7sc8-fzw3-vfer |
| vulnerability_id |
VCID-7sc8-fzw3-vfer |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which could result in a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35448 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32892 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32762 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32927 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.5566 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55697 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55678 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55634 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55686 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55689 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35448 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-35448
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7sc8-fzw3-vfer |
|
| 1 |
| url |
VCID-vepg-jnnm-97d7 |
| vulnerability_id |
VCID-vepg-jnnm-97d7 |
| summary |
Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-20294 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.1586 |
| scoring_system |
epss |
| scoring_elements |
0.94712 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.1586 |
| scoring_system |
epss |
| scoring_elements |
0.94724 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.1586 |
| scoring_system |
epss |
| scoring_elements |
0.9472 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.22712 |
| scoring_system |
epss |
| scoring_elements |
0.95857 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.22712 |
| scoring_system |
epss |
| scoring_elements |
0.9586 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.22712 |
| scoring_system |
epss |
| scoring_elements |
0.95863 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.22712 |
| scoring_system |
epss |
| scoring_elements |
0.95848 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.22712 |
| scoring_system |
epss |
| scoring_elements |
0.95864 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-20294 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-20294
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vepg-jnnm-97d7 |
|
| 2 |
|
|
|
3.1
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.35.1-1
|
|
|
pkg:alpm/archlinux/binutils@2.36-1
|
alpm
|
archlinux
|
binutils
|
2.36-1
|
|
|
false
|
2.37-1
|
2.38-1
|
|
| 0 |
| url |
VCID-7sc8-fzw3-vfer |
| vulnerability_id |
VCID-7sc8-fzw3-vfer |
| summary |
Multiple vulnerabilities have been found in Binutils, the worst of
which could result in a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35448 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32892 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32762 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00132 |
| scoring_system |
epss |
| scoring_elements |
0.32927 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.5566 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55697 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55678 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55634 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55686 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00327 |
| scoring_system |
epss |
| scoring_elements |
0.55689 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35448 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-35448
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7sc8-fzw3-vfer |
|
| 1 |
| url |
VCID-vepg-jnnm-97d7 |
| vulnerability_id |
VCID-vepg-jnnm-97d7 |
| summary |
Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-20294 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.1586 |
| scoring_system |
epss |
| scoring_elements |
0.94712 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.1586 |
| scoring_system |
epss |
| scoring_elements |
0.94724 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.1586 |
| scoring_system |
epss |
| scoring_elements |
0.9472 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.22712 |
| scoring_system |
epss |
| scoring_elements |
0.95857 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.22712 |
| scoring_system |
epss |
| scoring_elements |
0.9586 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.22712 |
| scoring_system |
epss |
| scoring_elements |
0.95863 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.22712 |
| scoring_system |
epss |
| scoring_elements |
0.95848 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.22712 |
| scoring_system |
epss |
| scoring_elements |
0.95864 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-20294 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-20294
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vepg-jnnm-97d7 |
|
| 2 |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.36-1
|
|
|
pkg:alpm/archlinux/binutils@2.36.1-3
|
alpm
|
archlinux
|
binutils
|
2.36.1-3
|
|
|
true
|
2.37-1
|
2.38-1
|
| 0 |
| url |
VCID-4uea-bxbr-2kdz |
| vulnerability_id |
VCID-4uea-bxbr-2kdz |
| summary |
Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3530 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00354 |
| scoring_system |
epss |
| scoring_elements |
0.57639 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00354 |
| scoring_system |
epss |
| scoring_elements |
0.5775 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00354 |
| scoring_system |
epss |
| scoring_elements |
0.57791 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00354 |
| scoring_system |
epss |
| scoring_elements |
0.5777 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00354 |
| scoring_system |
epss |
| scoring_elements |
0.57724 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00354 |
| scoring_system |
epss |
| scoring_elements |
0.57745 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00354 |
| scoring_system |
epss |
| scoring_elements |
0.57719 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00354 |
| scoring_system |
epss |
| scoring_elements |
0.57774 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00354 |
| scoring_system |
epss |
| scoring_elements |
0.57776 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3530 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3530
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4uea-bxbr-2kdz |
|
| 1 |
|
| 2 |
| url |
VCID-uv5p-15z7-fqcn |
| vulnerability_id |
VCID-uv5p-15z7-fqcn |
| summary |
Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3549 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41213 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41259 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41307 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41335 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00346 |
| scoring_system |
epss |
| scoring_elements |
0.5717 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00346 |
| scoring_system |
epss |
| scoring_elements |
0.57182 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00346 |
| scoring_system |
epss |
| scoring_elements |
0.57161 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00346 |
| scoring_system |
epss |
| scoring_elements |
0.57168 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00346 |
| scoring_system |
epss |
| scoring_elements |
0.57141 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3549 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3549
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uv5p-15z7-fqcn |
|
| 3 |
| url |
VCID-znqk-35mz-dqfk |
| vulnerability_id |
VCID-znqk-35mz-dqfk |
| summary |
Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-20197 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30284 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30186 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30313 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30361 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30177 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30238 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30272 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30275 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30232 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-20197 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-20197
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-znqk-35mz-dqfk |
|
|
|
3.1
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.36.1-3
|
|
|
pkg:alpm/archlinux/binutils@2.37-1
|
alpm
|
archlinux
|
binutils
|
2.37-1
|
|
|
false
|
2.38-1
|
2.38-1
|
|
| 0 |
| url |
VCID-uv5p-15z7-fqcn |
| vulnerability_id |
VCID-uv5p-15z7-fqcn |
| summary |
Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3549 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41213 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41259 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41307 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00193 |
| scoring_system |
epss |
| scoring_elements |
0.41335 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00346 |
| scoring_system |
epss |
| scoring_elements |
0.5717 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00346 |
| scoring_system |
epss |
| scoring_elements |
0.57182 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00346 |
| scoring_system |
epss |
| scoring_elements |
0.57161 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00346 |
| scoring_system |
epss |
| scoring_elements |
0.57168 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00346 |
| scoring_system |
epss |
| scoring_elements |
0.57141 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3549 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3549
|
| risk_score |
2.8 |
| exploitability |
0.5 |
| weighted_severity |
5.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-uv5p-15z7-fqcn |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.37-1
|
|
|
pkg:alpm/archlinux/binutils@2.38-1
|
alpm
|
archlinux
|
binutils
|
2.38-1
|
|
|
false
|
null
|
null
|
|
| 0 |
| url |
VCID-4uea-bxbr-2kdz |
| vulnerability_id |
VCID-4uea-bxbr-2kdz |
| summary |
Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3530 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00354 |
| scoring_system |
epss |
| scoring_elements |
0.57639 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00354 |
| scoring_system |
epss |
| scoring_elements |
0.5775 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00354 |
| scoring_system |
epss |
| scoring_elements |
0.57791 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00354 |
| scoring_system |
epss |
| scoring_elements |
0.5777 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00354 |
| scoring_system |
epss |
| scoring_elements |
0.57724 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00354 |
| scoring_system |
epss |
| scoring_elements |
0.57745 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00354 |
| scoring_system |
epss |
| scoring_elements |
0.57719 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00354 |
| scoring_system |
epss |
| scoring_elements |
0.57774 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00354 |
| scoring_system |
epss |
| scoring_elements |
0.57776 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3530 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3530
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4uea-bxbr-2kdz |
|
| 1 |
|
| 2 |
| url |
VCID-znqk-35mz-dqfk |
| vulnerability_id |
VCID-znqk-35mz-dqfk |
| summary |
Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-20197 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30284 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30186 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30313 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30361 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30177 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30238 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30272 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30275 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30232 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-20197 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-20197
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-znqk-35mz-dqfk |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/binutils@2.38-1
|
|
|
pkg:alpm/archlinux/bitcoin-daemon@22.0-1
|
alpm
|
archlinux
|
bitcoin-daemon
|
22.0-1
|
|
|
true
|
null
|
null
|
| 0 |
| url |
VCID-573d-byea-r7cg |
| vulnerability_id |
VCID-573d-byea-r7cg |
| summary |
bitcoind in Bitcoin Core through 0.21.0 can create a new file in an arbitrary directory (e.g., outside the ~/.bitcoin directory) via a dumpwallet RPC call. NOTE: this reportedly does not violate the security model of Bitcoin Core, but can violate the security model of a fork that has implemented dumpwallet restrictions |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3195 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.5006 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.5001 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.50048 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.50076 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.50026 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.50081 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.50074 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.50091 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00266 |
| scoring_system |
epss |
| scoring_elements |
0.50064 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3195 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3195
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-573d-byea-r7cg |
|
| 1 |
| url |
VCID-9g6t-dcaz-1kh3 |
| vulnerability_id |
VCID-9g6t-dcaz-1kh3 |
| summary |
Bitcoin Core 0.12.0 through 0.21.1 does not properly implement the replacement policy specified in BIP125, which makes it easier for attackers to trigger a loss of funds, or a denial of service attack against downstream projects such as Lightning network nodes. An unconfirmed child transaction with nSequence = 0xff_ff_ff_ff, spending an unconfirmed parent with nSequence <= 0xff_ff_ff_fd, should be replaceable because there is inherited signaling by the child transaction. However, the actual PreChecks implementation does not enforce this. Instead, mempool rejects the replacement attempt of the unconfirmed child transaction. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-31876 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00487 |
| scoring_system |
epss |
| scoring_elements |
0.65409 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00487 |
| scoring_system |
epss |
| scoring_elements |
0.6533 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00487 |
| scoring_system |
epss |
| scoring_elements |
0.65378 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00487 |
| scoring_system |
epss |
| scoring_elements |
0.65405 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00487 |
| scoring_system |
epss |
| scoring_elements |
0.65368 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00487 |
| scoring_system |
epss |
| scoring_elements |
0.65421 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00487 |
| scoring_system |
epss |
| scoring_elements |
0.65432 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00487 |
| scoring_system |
epss |
| scoring_elements |
0.65451 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00487 |
| scoring_system |
epss |
| scoring_elements |
0.65437 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-31876 |
|
| 1 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-31876
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9g6t-dcaz-1kh3 |
|
|
|
3.1
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bitcoin-daemon@22.0-1
|
|
|
pkg:alpm/archlinux/bitcoin-qt@0.16.2-2
|
alpm
|
archlinux
|
bitcoin-qt
|
0.16.2-2
|
|
|
true
|
0.16.3-1
|
0.16.3-1
|
| 0 |
| url |
VCID-mxhd-tkw3-vfd1 |
| vulnerability_id |
VCID-mxhd-tkw3-vfd1 |
| summary |
Bitcoin Core 0.14.x before 0.14.3, 0.15.x before 0.15.2, and 0.16.x before 0.16.3 and Bitcoin Knots 0.14.x through 0.16.x before 0.16.3 allow a remote denial of service (application crash) exploitable by miners via duplicate input. An attacker can make bitcoind or Bitcoin-Qt crash. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-17144 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.51467 |
| scoring_system |
epss |
| scoring_elements |
0.97889 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.51467 |
| scoring_system |
epss |
| scoring_elements |
0.97877 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.51467 |
| scoring_system |
epss |
| scoring_elements |
0.97881 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.51467 |
| scoring_system |
epss |
| scoring_elements |
0.97884 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.51467 |
| scoring_system |
epss |
| scoring_elements |
0.97887 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.51467 |
| scoring_system |
epss |
| scoring_elements |
0.97888 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.53268 |
| scoring_system |
epss |
| scoring_elements |
0.97957 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.53268 |
| scoring_system |
epss |
| scoring_elements |
0.9796 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.53268 |
| scoring_system |
epss |
| scoring_elements |
0.97962 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-17144 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-17144
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mxhd-tkw3-vfd1 |
|
|
|
3.1
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bitcoin-qt@0.16.2-2
|
|
|
pkg:alpm/archlinux/bitcoin-qt@0.16.3-1
|
alpm
|
archlinux
|
bitcoin-qt
|
0.16.3-1
|
|
|
false
|
null
|
null
|
|
| 0 |
| url |
VCID-mxhd-tkw3-vfd1 |
| vulnerability_id |
VCID-mxhd-tkw3-vfd1 |
| summary |
Bitcoin Core 0.14.x before 0.14.3, 0.15.x before 0.15.2, and 0.16.x before 0.16.3 and Bitcoin Knots 0.14.x through 0.16.x before 0.16.3 allow a remote denial of service (application crash) exploitable by miners via duplicate input. An attacker can make bitcoind or Bitcoin-Qt crash. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-17144 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.51467 |
| scoring_system |
epss |
| scoring_elements |
0.97889 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.51467 |
| scoring_system |
epss |
| scoring_elements |
0.97877 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.51467 |
| scoring_system |
epss |
| scoring_elements |
0.97881 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.51467 |
| scoring_system |
epss |
| scoring_elements |
0.97884 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.51467 |
| scoring_system |
epss |
| scoring_elements |
0.97887 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.51467 |
| scoring_system |
epss |
| scoring_elements |
0.97888 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.53268 |
| scoring_system |
epss |
| scoring_elements |
0.97957 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.53268 |
| scoring_system |
epss |
| scoring_elements |
0.9796 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.53268 |
| scoring_system |
epss |
| scoring_elements |
0.97962 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-17144 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-17144
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mxhd-tkw3-vfd1 |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bitcoin-qt@0.16.3-1
|
|
|
pkg:alpm/archlinux/bitcoin-tx@0.16.2-2
|
alpm
|
archlinux
|
bitcoin-tx
|
0.16.2-2
|
|
|
true
|
0.16.3-1
|
0.16.3-1
|
| 0 |
| url |
VCID-mxhd-tkw3-vfd1 |
| vulnerability_id |
VCID-mxhd-tkw3-vfd1 |
| summary |
Bitcoin Core 0.14.x before 0.14.3, 0.15.x before 0.15.2, and 0.16.x before 0.16.3 and Bitcoin Knots 0.14.x through 0.16.x before 0.16.3 allow a remote denial of service (application crash) exploitable by miners via duplicate input. An attacker can make bitcoind or Bitcoin-Qt crash. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-17144 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.51467 |
| scoring_system |
epss |
| scoring_elements |
0.97889 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.51467 |
| scoring_system |
epss |
| scoring_elements |
0.97877 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.51467 |
| scoring_system |
epss |
| scoring_elements |
0.97881 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.51467 |
| scoring_system |
epss |
| scoring_elements |
0.97884 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.51467 |
| scoring_system |
epss |
| scoring_elements |
0.97887 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.51467 |
| scoring_system |
epss |
| scoring_elements |
0.97888 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.53268 |
| scoring_system |
epss |
| scoring_elements |
0.97957 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.53268 |
| scoring_system |
epss |
| scoring_elements |
0.9796 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.53268 |
| scoring_system |
epss |
| scoring_elements |
0.97962 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-17144 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-17144
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mxhd-tkw3-vfd1 |
|
|
|
3.1
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bitcoin-tx@0.16.2-2
|
|
|
pkg:alpm/archlinux/bitcoin-tx@0.16.3-1
|
alpm
|
archlinux
|
bitcoin-tx
|
0.16.3-1
|
|
|
false
|
null
|
null
|
|
| 0 |
| url |
VCID-mxhd-tkw3-vfd1 |
| vulnerability_id |
VCID-mxhd-tkw3-vfd1 |
| summary |
Bitcoin Core 0.14.x before 0.14.3, 0.15.x before 0.15.2, and 0.16.x before 0.16.3 and Bitcoin Knots 0.14.x through 0.16.x before 0.16.3 allow a remote denial of service (application crash) exploitable by miners via duplicate input. An attacker can make bitcoind or Bitcoin-Qt crash. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-17144 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.51467 |
| scoring_system |
epss |
| scoring_elements |
0.97889 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.51467 |
| scoring_system |
epss |
| scoring_elements |
0.97877 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.51467 |
| scoring_system |
epss |
| scoring_elements |
0.97881 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.51467 |
| scoring_system |
epss |
| scoring_elements |
0.97884 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.51467 |
| scoring_system |
epss |
| scoring_elements |
0.97887 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.51467 |
| scoring_system |
epss |
| scoring_elements |
0.97888 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.53268 |
| scoring_system |
epss |
| scoring_elements |
0.97957 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.53268 |
| scoring_system |
epss |
| scoring_elements |
0.9796 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.53268 |
| scoring_system |
epss |
| scoring_elements |
0.97962 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-17144 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-17144
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mxhd-tkw3-vfd1 |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bitcoin-tx@0.16.3-1
|
|
|
pkg:alpm/archlinux/blender@17:3.0.1-6
|
alpm
|
archlinux
|
blender
|
17:3.0.1-6
|
|
|
true
|
17:3.1.0-1
|
17:3.1.0-1
|
| 0 |
| url |
VCID-3feg-t1sc-puhk |
| vulnerability_id |
VCID-3feg-t1sc-puhk |
| summary |
Multiple vulnerabilities have been discovered in Blender, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0546 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00503 |
| scoring_system |
epss |
| scoring_elements |
0.66082 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00503 |
| scoring_system |
epss |
| scoring_elements |
0.66112 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00504 |
| scoring_system |
epss |
| scoring_elements |
0.66148 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00504 |
| scoring_system |
epss |
| scoring_elements |
0.66116 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00504 |
| scoring_system |
epss |
| scoring_elements |
0.66079 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.00504 |
| scoring_system |
epss |
| scoring_elements |
0.66178 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00504 |
| scoring_system |
epss |
| scoring_elements |
0.66197 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00504 |
| scoring_system |
epss |
| scoring_elements |
0.66165 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00504 |
| scoring_system |
epss |
| scoring_elements |
0.66121 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0546 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0546
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3feg-t1sc-puhk |
|
| 1 |
| url |
VCID-anrz-grzm-bued |
| vulnerability_id |
VCID-anrz-grzm-bued |
| summary |
Multiple vulnerabilities have been discovered in Blender, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0545 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00375 |
| scoring_system |
epss |
| scoring_elements |
0.59111 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00375 |
| scoring_system |
epss |
| scoring_elements |
0.5913 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.5916 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59124 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59063 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59188 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59208 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59175 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59136 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0545 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0545
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-anrz-grzm-bued |
|
| 2 |
| url |
VCID-qsqj-j8s1-6qfq |
| vulnerability_id |
VCID-qsqj-j8s1-6qfq |
| summary |
Multiple vulnerabilities have been discovered in Blender, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0544 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.33991 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.33811 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34149 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34181 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34041 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34084 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34115 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34113 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34014 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0544 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0544
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qsqj-j8s1-6qfq |
|
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/blender@17:3.0.1-6
|
|
|
pkg:alpm/archlinux/blender@17:3.1.0-1
|
alpm
|
archlinux
|
blender
|
17:3.1.0-1
|
|
|
false
|
null
|
null
|
|
| 0 |
| url |
VCID-3feg-t1sc-puhk |
| vulnerability_id |
VCID-3feg-t1sc-puhk |
| summary |
Multiple vulnerabilities have been discovered in Blender, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0546 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00503 |
| scoring_system |
epss |
| scoring_elements |
0.66082 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00503 |
| scoring_system |
epss |
| scoring_elements |
0.66112 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00504 |
| scoring_system |
epss |
| scoring_elements |
0.66148 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00504 |
| scoring_system |
epss |
| scoring_elements |
0.66116 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00504 |
| scoring_system |
epss |
| scoring_elements |
0.66079 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.00504 |
| scoring_system |
epss |
| scoring_elements |
0.66178 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00504 |
| scoring_system |
epss |
| scoring_elements |
0.66197 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00504 |
| scoring_system |
epss |
| scoring_elements |
0.66165 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00504 |
| scoring_system |
epss |
| scoring_elements |
0.66121 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0546 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0546
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3feg-t1sc-puhk |
|
| 1 |
| url |
VCID-anrz-grzm-bued |
| vulnerability_id |
VCID-anrz-grzm-bued |
| summary |
Multiple vulnerabilities have been discovered in Blender, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0545 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00375 |
| scoring_system |
epss |
| scoring_elements |
0.59111 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00375 |
| scoring_system |
epss |
| scoring_elements |
0.5913 |
| published_at |
2026-04-12T12:55:00Z |
|
| 2 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.5916 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59124 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59063 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59188 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59208 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59175 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00376 |
| scoring_system |
epss |
| scoring_elements |
0.59136 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0545 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0545
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-anrz-grzm-bued |
|
| 2 |
| url |
VCID-qsqj-j8s1-6qfq |
| vulnerability_id |
VCID-qsqj-j8s1-6qfq |
| summary |
Multiple vulnerabilities have been discovered in Blender, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0544 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.33991 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.33811 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34149 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34181 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34041 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34084 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34115 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34113 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00139 |
| scoring_system |
epss |
| scoring_elements |
0.34014 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-0544 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2022-0544
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qsqj-j8s1-6qfq |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/blender@17:3.1.0-1
|
|
|
pkg:alpm/archlinux/blueman@2.1.3-1
|
alpm
|
archlinux
|
blueman
|
2.1.3-1
|
|
|
true
|
2.1.4-1
|
2.1.4-1
|
| 0 |
| url |
VCID-jgqj-mqt7-vucy |
| vulnerability_id |
VCID-jgqj-mqt7-vucy |
| summary |
A privilege escalation vulnerability has been discovered in
Blueman. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-15238 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.63697 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.63616 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.63676 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.63702 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.63662 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.63714 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.6373 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.63745 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.63731 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-15238 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-15238
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jgqj-mqt7-vucy |
|
|
|
10.0
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/blueman@2.1.3-1
|
|
|
pkg:alpm/archlinux/blueman@2.1.4-1
|
alpm
|
archlinux
|
blueman
|
2.1.4-1
|
|
|
false
|
null
|
null
|
|
| 0 |
| url |
VCID-jgqj-mqt7-vucy |
| vulnerability_id |
VCID-jgqj-mqt7-vucy |
| summary |
A privilege escalation vulnerability has been discovered in
Blueman. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-15238 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.63697 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.63616 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.63676 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.63702 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.63662 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.63714 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.6373 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.63745 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00451 |
| scoring_system |
epss |
| scoring_elements |
0.63731 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-15238 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-15238
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jgqj-mqt7-vucy |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/blueman@2.1.4-1
|
|
|
pkg:alpm/archlinux/bluez@5.46-1
|
alpm
|
archlinux
|
bluez
|
5.46-1
|
|
|
true
|
5.46-2
|
5.63-1
|
| 0 |
| url |
VCID-yrc6-qjud-zqaf |
| vulnerability_id |
VCID-yrc6-qjud-zqaf |
| summary |
security update |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-1000250 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.36932 |
| scoring_system |
epss |
| scoring_elements |
0.97124 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.36932 |
| scoring_system |
epss |
| scoring_elements |
0.97153 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.36932 |
| scoring_system |
epss |
| scoring_elements |
0.97136 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.36932 |
| scoring_system |
epss |
| scoring_elements |
0.97137 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.36932 |
| scoring_system |
epss |
| scoring_elements |
0.97147 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.36932 |
| scoring_system |
epss |
| scoring_elements |
0.97151 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.36932 |
| scoring_system |
epss |
| scoring_elements |
0.97152 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.36932 |
| scoring_system |
epss |
| scoring_elements |
0.9713 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-1000250 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-1000250
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yrc6-qjud-zqaf |
|
|
|
4.0
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bluez@5.46-1
|
|
|
pkg:alpm/archlinux/bluez@5.46-2
|
alpm
|
archlinux
|
bluez
|
5.46-2
|
|
|
false
|
5.54-1
|
5.63-1
|
|
| 0 |
| url |
VCID-yrc6-qjud-zqaf |
| vulnerability_id |
VCID-yrc6-qjud-zqaf |
| summary |
security update |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-1000250 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.36932 |
| scoring_system |
epss |
| scoring_elements |
0.97124 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.36932 |
| scoring_system |
epss |
| scoring_elements |
0.97153 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.36932 |
| scoring_system |
epss |
| scoring_elements |
0.97136 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.36932 |
| scoring_system |
epss |
| scoring_elements |
0.97137 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.36932 |
| scoring_system |
epss |
| scoring_elements |
0.97147 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.36932 |
| scoring_system |
epss |
| scoring_elements |
0.97151 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.36932 |
| scoring_system |
epss |
| scoring_elements |
0.97152 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.36932 |
| scoring_system |
epss |
| scoring_elements |
0.9713 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-1000250 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-1000250
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yrc6-qjud-zqaf |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bluez@5.46-2
|
|
|
pkg:alpm/archlinux/bluez@5.53-1
|
alpm
|
archlinux
|
bluez
|
5.53-1
|
|
|
true
|
5.54-1
|
5.63-1
|
| 0 |
| url |
VCID-zyyf-565p-h7d6 |
| vulnerability_id |
VCID-zyyf-565p-h7d6 |
| summary |
A vulnerability in BlueZ might allow remote attackers to bypass
security restrictions. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-0556 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00161 |
| scoring_system |
epss |
| scoring_elements |
0.36955 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00161 |
| scoring_system |
epss |
| scoring_elements |
0.37002 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00161 |
| scoring_system |
epss |
| scoring_elements |
0.37041 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00161 |
| scoring_system |
epss |
| scoring_elements |
0.37053 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00161 |
| scoring_system |
epss |
| scoring_elements |
0.37063 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00161 |
| scoring_system |
epss |
| scoring_elements |
0.37029 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00161 |
| scoring_system |
epss |
| scoring_elements |
0.37128 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00161 |
| scoring_system |
epss |
| scoring_elements |
0.3716 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00161 |
| scoring_system |
epss |
| scoring_elements |
0.3699 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-0556 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-0556
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zyyf-565p-h7d6 |
|
|
|
4.0
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bluez@5.53-1
|
|
|
pkg:alpm/archlinux/bluez@5.54-1
|
alpm
|
archlinux
|
bluez
|
5.54-1
|
|
|
false
|
5.56-1
|
5.63-1
|
|
| 0 |
| url |
VCID-zyyf-565p-h7d6 |
| vulnerability_id |
VCID-zyyf-565p-h7d6 |
| summary |
A vulnerability in BlueZ might allow remote attackers to bypass
security restrictions. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-0556 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00161 |
| scoring_system |
epss |
| scoring_elements |
0.36955 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00161 |
| scoring_system |
epss |
| scoring_elements |
0.37002 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00161 |
| scoring_system |
epss |
| scoring_elements |
0.37041 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00161 |
| scoring_system |
epss |
| scoring_elements |
0.37053 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00161 |
| scoring_system |
epss |
| scoring_elements |
0.37063 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00161 |
| scoring_system |
epss |
| scoring_elements |
0.37029 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00161 |
| scoring_system |
epss |
| scoring_elements |
0.37128 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00161 |
| scoring_system |
epss |
| scoring_elements |
0.3716 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00161 |
| scoring_system |
epss |
| scoring_elements |
0.3699 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-0556 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-0556
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zyyf-565p-h7d6 |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bluez@5.54-1
|
|
|
pkg:alpm/archlinux/bluez@5.55-3
|
alpm
|
archlinux
|
bluez
|
5.55-3
|
|
|
true
|
5.56-1
|
5.63-1
|
| 0 |
| url |
VCID-6d8c-y2y7-t3cj |
| vulnerability_id |
VCID-6d8c-y2y7-t3cj |
| summary |
Multiple vulnerabilities have been discovered in BlueZ, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3588 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31148 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31139 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31226 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31182 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31276 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31317 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31137 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.3119 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31221 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3588 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3588
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6d8c-y2y7-t3cj |
|
|
|
3.1
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bluez@5.55-3
|
|
|
pkg:alpm/archlinux/bluez@5.56-1
|
alpm
|
archlinux
|
bluez
|
5.56-1
|
|
|
false
|
5.57-1
|
5.63-1
|
|
| 0 |
| url |
VCID-6d8c-y2y7-t3cj |
| vulnerability_id |
VCID-6d8c-y2y7-t3cj |
| summary |
Multiple vulnerabilities have been discovered in BlueZ, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3588 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31148 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31139 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31226 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31182 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31276 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31317 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31137 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.3119 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00121 |
| scoring_system |
epss |
| scoring_elements |
0.31221 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3588 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3588
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6d8c-y2y7-t3cj |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bluez@5.56-1
|
|
|
pkg:alpm/archlinux/bluez@5.56-2
|
alpm
|
archlinux
|
bluez
|
5.56-2
|
|
|
true
|
5.57-1
|
5.63-1
|
| 0 |
| url |
VCID-ctaf-8vuf-tqgg |
| vulnerability_id |
VCID-ctaf-8vuf-tqgg |
| summary |
Multiple vulnerabilities have been discovered in BlueZ, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-26558 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06206 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06312 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06337 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06329 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06324 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.0624 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06271 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.0625 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06296 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-26558 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-26558
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ctaf-8vuf-tqgg |
|
|
|
3.1
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bluez@5.56-2
|
|
|
pkg:alpm/archlinux/bluez@5.57-1
|
alpm
|
archlinux
|
bluez
|
5.57-1
|
|
|
false
|
5.61-1
|
5.63-1
|
|
| 0 |
| url |
VCID-ctaf-8vuf-tqgg |
| vulnerability_id |
VCID-ctaf-8vuf-tqgg |
| summary |
Multiple vulnerabilities have been discovered in BlueZ, the worst of which could result in arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-26558 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06206 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06312 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06337 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06329 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06324 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.0624 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06271 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.0625 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00023 |
| scoring_system |
epss |
| scoring_elements |
0.06296 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-26558 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-26558
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ctaf-8vuf-tqgg |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bluez@5.57-1
|
|
|
pkg:alpm/archlinux/bluez@5.60-1
|
alpm
|
archlinux
|
bluez
|
5.60-1
|
|
|
true
|
5.61-1
|
5.63-1
|
| 0 |
| url |
VCID-15pa-mh4x-13ch |
| vulnerability_id |
VCID-15pa-mh4x-13ch |
| summary |
bluez: adapter incorrectly restores Discoverable state after powered down |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3658 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22114 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22155 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22256 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22215 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22273 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22315 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22101 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22183 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22237 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3658 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3658
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-15pa-mh4x-13ch |
|
|
|
2.0
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bluez@5.60-1
|
|
|
pkg:alpm/archlinux/bluez@5.61-1
|
alpm
|
archlinux
|
bluez
|
5.61-1
|
|
|
false
|
5.63-1
|
5.63-1
|
|
| 0 |
| url |
VCID-15pa-mh4x-13ch |
| vulnerability_id |
VCID-15pa-mh4x-13ch |
| summary |
bluez: adapter incorrectly restores Discoverable state after powered down |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3658 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22114 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22155 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22256 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22215 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22273 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22315 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22101 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22183 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00073 |
| scoring_system |
epss |
| scoring_elements |
0.22237 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3658 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3658
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-15pa-mh4x-13ch |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bluez@5.61-1
|
|
|
pkg:alpm/archlinux/bluez@5.62-1
|
alpm
|
archlinux
|
bluez
|
5.62-1
|
|
|
true
|
5.63-1
|
5.63-1
|
| 0 |
| url |
VCID-g2pd-d2mm-8fd3 |
| vulnerability_id |
VCID-g2pd-d2mm-8fd3 |
| summary |
bluez: memory leak in the SDP protocol |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-41229 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13504 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13482 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13568 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.1353 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13604 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13665 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13465 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13545 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13595 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-41229 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-41229
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-g2pd-d2mm-8fd3 |
|
|
|
3.1
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bluez@5.62-1
|
|
|
pkg:alpm/archlinux/bluez@5.63-1
|
alpm
|
archlinux
|
bluez
|
5.63-1
|
|
|
false
|
null
|
null
|
|
| 0 |
| url |
VCID-g2pd-d2mm-8fd3 |
| vulnerability_id |
VCID-g2pd-d2mm-8fd3 |
| summary |
bluez: memory leak in the SDP protocol |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-41229 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13504 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13482 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13568 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.1353 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13604 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13665 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13465 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13545 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00044 |
| scoring_system |
epss |
| scoring_elements |
0.13595 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-41229 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-41229
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-g2pd-d2mm-8fd3 |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bluez@5.63-1
|
|
|
pkg:alpm/archlinux/botan@2.2.0-1
|
alpm
|
archlinux
|
botan
|
2.2.0-1
|
|
|
true
|
2.3.0-1
|
2.18.2-1
|
| 0 |
| url |
VCID-8nmu-s87y-wycj |
| vulnerability_id |
VCID-8nmu-s87y-wycj |
| summary |
A cryptographic cache-based side channel in the RSA implementation in Botan before 1.10.17, and 1.11.x and 2.x before 2.3.0, allows a local attacker to recover information about RSA secret keys, as demonstrated by CacheD. This occurs because an array is indexed with bits derived from a secret key. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-14737 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16167 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16227 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16293 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16275 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16235 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16096 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.1628 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16341 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16141 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-14737 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-14737
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8nmu-s87y-wycj |
|
|
|
3.1
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/botan@2.2.0-1
|
|
|
pkg:alpm/archlinux/botan@2.3.0-1
|
alpm
|
archlinux
|
botan
|
2.3.0-1
|
|
|
false
|
2.18.2-1
|
2.18.2-1
|
|
| 0 |
| url |
VCID-8nmu-s87y-wycj |
| vulnerability_id |
VCID-8nmu-s87y-wycj |
| summary |
A cryptographic cache-based side channel in the RSA implementation in Botan before 1.10.17, and 1.11.x and 2.x before 2.3.0, allows a local attacker to recover information about RSA secret keys, as demonstrated by CacheD. This occurs because an array is indexed with bits derived from a secret key. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-14737 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16167 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16227 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16293 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16275 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16235 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16096 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.1628 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16341 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16141 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-14737 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-14737
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8nmu-s87y-wycj |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/botan@2.3.0-1
|
|
|
pkg:alpm/archlinux/botan@2.18.1-1
|
alpm
|
archlinux
|
botan
|
2.18.1-1
|
|
|
true
|
2.18.2-1
|
2.18.2-1
|
| 0 |
| url |
VCID-xffg-w6fz-yqfj |
| vulnerability_id |
VCID-xffg-w6fz-yqfj |
| summary |
Use of a Broken or Risky Cryptographic Algorithm
The ElGamal implementation in Botan, as used in Thunderbird and other products, allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-40529 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53325 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53242 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53265 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53291 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.5326 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53312 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53307 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53357 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53341 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-40529 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-40529
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xffg-w6fz-yqfj |
|
|
|
3.1
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/botan@2.18.1-1
|
|
|
pkg:alpm/archlinux/botan@2.18.2-1
|
alpm
|
archlinux
|
botan
|
2.18.2-1
|
|
|
false
|
null
|
null
|
|
| 0 |
| url |
VCID-xffg-w6fz-yqfj |
| vulnerability_id |
VCID-xffg-w6fz-yqfj |
| summary |
Use of a Broken or Risky Cryptographic Algorithm
The ElGamal implementation in Botan, as used in Thunderbird and other products, allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-40529 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53325 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53242 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53265 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53291 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.5326 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53312 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53307 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53357 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.003 |
| scoring_system |
epss |
| scoring_elements |
0.53341 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-40529 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-40529
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xffg-w6fz-yqfj |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/botan@2.18.2-1
|
|
|
pkg:alpm/archlinux/brotli@1.0.7-1
|
alpm
|
archlinux
|
brotli
|
1.0.7-1
|
|
|
true
|
1.0.9-1
|
1.0.9-1
|
| 0 |
| url |
VCID-69ua-s6h2-3uhc |
| vulnerability_id |
VCID-69ua-s6h2-3uhc |
| summary |
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-36846 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0054 |
| scoring_system |
epss |
| scoring_elements |
0.67617 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.0054 |
| scoring_system |
epss |
| scoring_elements |
0.6754 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0054 |
| scoring_system |
epss |
| scoring_elements |
0.67576 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0054 |
| scoring_system |
epss |
| scoring_elements |
0.67627 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0054 |
| scoring_system |
epss |
| scoring_elements |
0.67598 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.0054 |
| scoring_system |
epss |
| scoring_elements |
0.6764 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0054 |
| scoring_system |
epss |
| scoring_elements |
0.67663 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0054 |
| scoring_system |
epss |
| scoring_elements |
0.67649 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-36846 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8927 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54138 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54146 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54167 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54185 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54135 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54086 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54112 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54083 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54065 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8927 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://github.com/bitemyapp/brotli2-rs |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/bitemyapp/brotli2-rs |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2020-8927 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L |
|
| 1 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 4 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-30T14:40:47Z/ |
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2020-8927 |
|
| 30 |
|
| 31 |
|
| 32 |
| reference_url |
https://usn.ubuntu.com/4568-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/4568-1 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
|
| fixed_packages |
|
| aliases |
BIT-brotli-2020-8927, BIT-dotnet-2020-8927, BIT-dotnet-sdk-2020-8927, BIT-powershell-2020-8927, CVE-2020-36846, CVE-2020-8927, GHSA-5v8v-66v8-mwm7, GO-2025-3726, PYSEC-2020-29, RUSTSEC-2021-0131, RUSTSEC-2021-0132
|
| risk_score |
4.4 |
| exploitability |
0.5 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-69ua-s6h2-3uhc |
|
|
|
4.4
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/brotli@1.0.7-1
|
|
|
pkg:alpm/archlinux/brotli@1.0.9-1
|
alpm
|
archlinux
|
brotli
|
1.0.9-1
|
|
|
false
|
null
|
null
|
|
| 0 |
| url |
VCID-69ua-s6h2-3uhc |
| vulnerability_id |
VCID-69ua-s6h2-3uhc |
| summary |
A buffer overflow exists in the Brotli library versions prior to 1.0.8 where an attacker controlling the input length of a "one-shot" decompression request to a script can trigger a crash, which happens when copying over chunks of data larger than 2 GiB. It is recommended to update your Brotli library to 1.0.8 or later. If one cannot update, we recommend to use the "streaming" API as opposed to the "one-shot" API, and impose chunk size limits. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-36846 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0054 |
| scoring_system |
epss |
| scoring_elements |
0.67617 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.0054 |
| scoring_system |
epss |
| scoring_elements |
0.6754 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0054 |
| scoring_system |
epss |
| scoring_elements |
0.67576 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0054 |
| scoring_system |
epss |
| scoring_elements |
0.67627 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.0054 |
| scoring_system |
epss |
| scoring_elements |
0.67598 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.0054 |
| scoring_system |
epss |
| scoring_elements |
0.6764 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0054 |
| scoring_system |
epss |
| scoring_elements |
0.67663 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0054 |
| scoring_system |
epss |
| scoring_elements |
0.67649 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-36846 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8927 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54138 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54146 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54167 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54185 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54135 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54086 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54112 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54083 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.0031 |
| scoring_system |
epss |
| scoring_elements |
0.54065 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8927 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://github.com/bitemyapp/brotli2-rs |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/bitemyapp/brotli2-rs |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2020-8927 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L |
|
| 1 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 4 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-30T14:40:47Z/ |
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2020-8927 |
|
| 30 |
|
| 31 |
|
| 32 |
| reference_url |
https://usn.ubuntu.com/4568-1 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://usn.ubuntu.com/4568-1 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
|
| fixed_packages |
|
| aliases |
BIT-brotli-2020-8927, BIT-dotnet-2020-8927, BIT-dotnet-sdk-2020-8927, BIT-powershell-2020-8927, CVE-2020-36846, CVE-2020-8927, GHSA-5v8v-66v8-mwm7, GO-2025-3726, PYSEC-2020-29, RUSTSEC-2021-0131, RUSTSEC-2021-0132
|
| risk_score |
4.4 |
| exploitability |
0.5 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-69ua-s6h2-3uhc |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/brotli@1.0.9-1
|
|
|
pkg:alpm/archlinux/busybox@1.27.2-1
|
alpm
|
archlinux
|
busybox
|
1.27.2-1
|
|
|
true
|
1.28.1-1
|
1.34.1-1
|
| 0 |
| url |
VCID-dktd-xqjr-h7h1 |
| vulnerability_id |
VCID-dktd-xqjr-h7h1 |
| summary |
Multiple vulnerabilities have been found in BusyBox, the worst of
which could allow remote attackers to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16544 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03313 |
| scoring_system |
epss |
| scoring_elements |
0.87216 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.03313 |
| scoring_system |
epss |
| scoring_elements |
0.87206 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.03313 |
| scoring_system |
epss |
| scoring_elements |
0.87232 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.03313 |
| scoring_system |
epss |
| scoring_elements |
0.87229 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.03313 |
| scoring_system |
epss |
| scoring_elements |
0.87249 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.03313 |
| scoring_system |
epss |
| scoring_elements |
0.87256 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.03313 |
| scoring_system |
epss |
| scoring_elements |
0.87268 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.03313 |
| scoring_system |
epss |
| scoring_elements |
0.87263 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.03313 |
| scoring_system |
epss |
| scoring_elements |
0.87258 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16544 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
| reference_url |
https://usn.ubuntu.com/3935-1/ |
| reference_id |
USN-3935-1 |
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:34:08Z/ |
|
|
| url |
https://usn.ubuntu.com/3935-1/ |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-16544
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dktd-xqjr-h7h1 |
|
|
|
4.0
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/busybox@1.27.2-1
|
|
|
pkg:alpm/archlinux/busybox@1.28.1-1
|
alpm
|
archlinux
|
busybox
|
1.28.1-1
|
|
|
false
|
1.32.1-4
|
1.34.1-1
|
|
| 0 |
| url |
VCID-dktd-xqjr-h7h1 |
| vulnerability_id |
VCID-dktd-xqjr-h7h1 |
| summary |
Multiple vulnerabilities have been found in BusyBox, the worst of
which could allow remote attackers to execute arbitrary code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16544 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03313 |
| scoring_system |
epss |
| scoring_elements |
0.87216 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.03313 |
| scoring_system |
epss |
| scoring_elements |
0.87206 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.03313 |
| scoring_system |
epss |
| scoring_elements |
0.87232 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.03313 |
| scoring_system |
epss |
| scoring_elements |
0.87229 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.03313 |
| scoring_system |
epss |
| scoring_elements |
0.87249 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.03313 |
| scoring_system |
epss |
| scoring_elements |
0.87256 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.03313 |
| scoring_system |
epss |
| scoring_elements |
0.87268 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.03313 |
| scoring_system |
epss |
| scoring_elements |
0.87263 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.03313 |
| scoring_system |
epss |
| scoring_elements |
0.87258 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16544 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
| reference_url |
https://usn.ubuntu.com/3935-1/ |
| reference_id |
USN-3935-1 |
| reference_type |
|
| scores |
| 0 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:34:08Z/ |
|
|
| url |
https://usn.ubuntu.com/3935-1/ |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-16544
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dktd-xqjr-h7h1 |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/busybox@1.28.1-1
|
|
|
pkg:alpm/archlinux/busybox@1.32.1-3
|
alpm
|
archlinux
|
busybox
|
1.32.1-3
|
|
|
true
|
1.32.1-4
|
1.34.1-1
|
| 0 |
| url |
VCID-vpmv-afzs-tffj |
| vulnerability_id |
VCID-vpmv-afzs-tffj |
| summary |
A vulnerability in BusyBox might allow remote attackers to cause a
Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-28831 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01019 |
| scoring_system |
epss |
| scoring_elements |
0.77155 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01019 |
| scoring_system |
epss |
| scoring_elements |
0.77217 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.01019 |
| scoring_system |
epss |
| scoring_elements |
0.77161 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01019 |
| scoring_system |
epss |
| scoring_elements |
0.77191 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01019 |
| scoring_system |
epss |
| scoring_elements |
0.77173 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01019 |
| scoring_system |
epss |
| scoring_elements |
0.77205 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01019 |
| scoring_system |
epss |
| scoring_elements |
0.77214 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01019 |
| scoring_system |
epss |
| scoring_elements |
0.77241 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01019 |
| scoring_system |
epss |
| scoring_elements |
0.7722 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-28831 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-28831
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vpmv-afzs-tffj |
|
|
|
3.4
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/busybox@1.32.1-3
|
|
|
pkg:alpm/archlinux/busybox@1.32.1-4
|
alpm
|
archlinux
|
busybox
|
1.32.1-4
|
|
|
false
|
1.34.1-1
|
1.34.1-1
|
|
| 0 |
| url |
VCID-vpmv-afzs-tffj |
| vulnerability_id |
VCID-vpmv-afzs-tffj |
| summary |
A vulnerability in BusyBox might allow remote attackers to cause a
Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-28831 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01019 |
| scoring_system |
epss |
| scoring_elements |
0.77155 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01019 |
| scoring_system |
epss |
| scoring_elements |
0.77217 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.01019 |
| scoring_system |
epss |
| scoring_elements |
0.77161 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01019 |
| scoring_system |
epss |
| scoring_elements |
0.77191 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01019 |
| scoring_system |
epss |
| scoring_elements |
0.77173 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01019 |
| scoring_system |
epss |
| scoring_elements |
0.77205 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01019 |
| scoring_system |
epss |
| scoring_elements |
0.77214 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01019 |
| scoring_system |
epss |
| scoring_elements |
0.77241 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01019 |
| scoring_system |
epss |
| scoring_elements |
0.7722 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-28831 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-28831
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vpmv-afzs-tffj |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/busybox@1.32.1-4
|
|
|
pkg:alpm/archlinux/busybox@1.33.1-1
|
alpm
|
archlinux
|
busybox
|
1.33.1-1
|
|
|
true
|
1.34.1-1
|
1.34.1-1
|
| 0 |
| url |
VCID-4muk-rhx5-yqeu |
| vulnerability_id |
VCID-4muk-rhx5-yqeu |
| summary |
Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42386 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52565 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52665 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52608 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52634 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52601 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52652 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52647 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52697 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52681 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42386 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-42386
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4muk-rhx5-yqeu |
|
| 1 |
| url |
VCID-4qpt-mxfy-6bh6 |
| vulnerability_id |
VCID-4qpt-mxfy-6bh6 |
| summary |
Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42385 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52565 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52665 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52608 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52634 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52601 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52652 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52647 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52697 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52681 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42385 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-42385
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4qpt-mxfy-6bh6 |
|
| 2 |
| url |
VCID-8r73-bpac-dubc |
| vulnerability_id |
VCID-8r73-bpac-dubc |
| summary |
Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42377 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02855 |
| scoring_system |
epss |
| scoring_elements |
0.86174 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02855 |
| scoring_system |
epss |
| scoring_elements |
0.86236 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.02855 |
| scoring_system |
epss |
| scoring_elements |
0.86228 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.02855 |
| scoring_system |
epss |
| scoring_elements |
0.86243 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.02855 |
| scoring_system |
epss |
| scoring_elements |
0.8624 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.02855 |
| scoring_system |
epss |
| scoring_elements |
0.86184 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.02855 |
| scoring_system |
epss |
| scoring_elements |
0.86197 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.02855 |
| scoring_system |
epss |
| scoring_elements |
0.86198 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.02855 |
| scoring_system |
epss |
| scoring_elements |
0.86217 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42377 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-42377
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8r73-bpac-dubc |
|
| 3 |
| url |
VCID-92nk-cwc9-rkg4 |
| vulnerability_id |
VCID-92nk-cwc9-rkg4 |
| summary |
Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42375 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19135 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19076 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19269 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.1932 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19035 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19115 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19168 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19175 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19128 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42375 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-42375
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-92nk-cwc9-rkg4 |
|
| 4 |
| url |
VCID-9fex-zr2n-w3cb |
| vulnerability_id |
VCID-9fex-zr2n-w3cb |
| summary |
Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42384 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.4647 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46535 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46507 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46527 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46476 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46531 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46555 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42384 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-42384
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9fex-zr2n-w3cb |
|
| 5 |
| url |
VCID-dse8-esmh-3ygm |
| vulnerability_id |
VCID-dse8-esmh-3ygm |
| summary |
Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42380 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63711 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63716 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63676 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63728 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63745 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63759 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00464 |
| scoring_system |
epss |
| scoring_elements |
0.64309 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00464 |
| scoring_system |
epss |
| scoring_elements |
0.64251 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42380 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-42380
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dse8-esmh-3ygm |
|
| 6 |
| url |
VCID-gdfa-8gar-47gd |
| vulnerability_id |
VCID-gdfa-8gar-47gd |
| summary |
Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42379 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.4647 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46535 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46507 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46527 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46476 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46531 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46555 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42379 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-42379
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gdfa-8gar-47gd |
|
| 7 |
| url |
VCID-jjxj-yf1x-4qg5 |
| vulnerability_id |
VCID-jjxj-yf1x-4qg5 |
| summary |
Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42378 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.4647 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46535 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46507 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46527 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46476 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46531 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46555 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42378 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-42378
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jjxj-yf1x-4qg5 |
|
| 8 |
| url |
VCID-mdmz-hjvu-hke3 |
| vulnerability_id |
VCID-mdmz-hjvu-hke3 |
| summary |
Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42382 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.54992 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55117 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55094 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55118 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55093 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55143 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55155 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55135 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42382 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-42382
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mdmz-hjvu-hke3 |
|
| 9 |
| url |
VCID-r12h-q1dj-a7b8 |
| vulnerability_id |
VCID-r12h-q1dj-a7b8 |
| summary |
Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42381 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.54992 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55117 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55094 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55118 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55093 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55143 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55155 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55135 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42381 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-42381
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-r12h-q1dj-a7b8 |
|
| 10 |
| url |
VCID-rp81-5jrg-jkht |
| vulnerability_id |
VCID-rp81-5jrg-jkht |
| summary |
Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42373 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.2428 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24249 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24331 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24349 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24306 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24407 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24439 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24222 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24288 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42373 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-42373
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rp81-5jrg-jkht |
|
| 11 |
| url |
VCID-svyb-nqje-dbcs |
| vulnerability_id |
VCID-svyb-nqje-dbcs |
| summary |
Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42383 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52144 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.5225 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52215 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.5218 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52233 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52229 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.5228 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52264 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42383 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-42383
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-svyb-nqje-dbcs |
|
| 12 |
| url |
VCID-tkat-gfks-kqg9 |
| vulnerability_id |
VCID-tkat-gfks-kqg9 |
| summary |
Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42374 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20042 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20022 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20189 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20244 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19969 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20049 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20107 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20126 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.2008 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42374 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-42374
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tkat-gfks-kqg9 |
|
| 13 |
| url |
VCID-vjyq-6k64-7fat |
| vulnerability_id |
VCID-vjyq-6k64-7fat |
| summary |
Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42376 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13819 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13766 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13893 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13851 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13815 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13902 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13958 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.1376 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13843 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42376 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-42376
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vjyq-6k64-7fat |
|
|
|
3.2
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/busybox@1.33.1-1
|
|
|
pkg:alpm/archlinux/busybox@1.34.1-1
|
alpm
|
archlinux
|
busybox
|
1.34.1-1
|
|
|
false
|
null
|
null
|
|
| 0 |
| url |
VCID-4muk-rhx5-yqeu |
| vulnerability_id |
VCID-4muk-rhx5-yqeu |
| summary |
Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42386 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52565 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52665 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52608 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52634 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52601 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52652 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52647 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52697 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52681 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42386 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-42386
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4muk-rhx5-yqeu |
|
| 1 |
| url |
VCID-4qpt-mxfy-6bh6 |
| vulnerability_id |
VCID-4qpt-mxfy-6bh6 |
| summary |
Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42385 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52565 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52665 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52608 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52634 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52601 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52652 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52647 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52697 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00293 |
| scoring_system |
epss |
| scoring_elements |
0.52681 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42385 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-42385
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4qpt-mxfy-6bh6 |
|
| 2 |
| url |
VCID-8r73-bpac-dubc |
| vulnerability_id |
VCID-8r73-bpac-dubc |
| summary |
Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42377 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02855 |
| scoring_system |
epss |
| scoring_elements |
0.86174 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02855 |
| scoring_system |
epss |
| scoring_elements |
0.86236 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.02855 |
| scoring_system |
epss |
| scoring_elements |
0.86228 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.02855 |
| scoring_system |
epss |
| scoring_elements |
0.86243 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.02855 |
| scoring_system |
epss |
| scoring_elements |
0.8624 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.02855 |
| scoring_system |
epss |
| scoring_elements |
0.86184 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.02855 |
| scoring_system |
epss |
| scoring_elements |
0.86197 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.02855 |
| scoring_system |
epss |
| scoring_elements |
0.86198 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.02855 |
| scoring_system |
epss |
| scoring_elements |
0.86217 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42377 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-42377
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8r73-bpac-dubc |
|
| 3 |
| url |
VCID-92nk-cwc9-rkg4 |
| vulnerability_id |
VCID-92nk-cwc9-rkg4 |
| summary |
Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42375 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19135 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19076 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19269 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.1932 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19035 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19115 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19168 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19175 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00061 |
| scoring_system |
epss |
| scoring_elements |
0.19128 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42375 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-42375
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-92nk-cwc9-rkg4 |
|
| 4 |
| url |
VCID-9fex-zr2n-w3cb |
| vulnerability_id |
VCID-9fex-zr2n-w3cb |
| summary |
Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42384 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.4647 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46535 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46507 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46527 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46476 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46531 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46555 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42384 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-42384
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-9fex-zr2n-w3cb |
|
| 5 |
| url |
VCID-dse8-esmh-3ygm |
| vulnerability_id |
VCID-dse8-esmh-3ygm |
| summary |
Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42380 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63711 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63716 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63676 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63728 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63745 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00452 |
| scoring_system |
epss |
| scoring_elements |
0.63759 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00464 |
| scoring_system |
epss |
| scoring_elements |
0.64309 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00464 |
| scoring_system |
epss |
| scoring_elements |
0.64251 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42380 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-42380
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dse8-esmh-3ygm |
|
| 6 |
| url |
VCID-gdfa-8gar-47gd |
| vulnerability_id |
VCID-gdfa-8gar-47gd |
| summary |
Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42379 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.4647 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46535 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46507 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46527 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46476 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46531 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46555 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42379 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-42379
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gdfa-8gar-47gd |
|
| 7 |
| url |
VCID-jjxj-yf1x-4qg5 |
| vulnerability_id |
VCID-jjxj-yf1x-4qg5 |
| summary |
Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42378 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.4647 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46535 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46507 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46527 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46476 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46531 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00236 |
| scoring_system |
epss |
| scoring_elements |
0.46555 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42378 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-42378
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jjxj-yf1x-4qg5 |
|
| 8 |
| url |
VCID-mdmz-hjvu-hke3 |
| vulnerability_id |
VCID-mdmz-hjvu-hke3 |
| summary |
Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42382 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.54992 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55117 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55094 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55118 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55093 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55143 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55155 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55135 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42382 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-42382
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-mdmz-hjvu-hke3 |
|
| 9 |
| url |
VCID-r12h-q1dj-a7b8 |
| vulnerability_id |
VCID-r12h-q1dj-a7b8 |
| summary |
Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42381 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.54992 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55117 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55094 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55118 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55093 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55143 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55155 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00321 |
| scoring_system |
epss |
| scoring_elements |
0.55135 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42381 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-42381
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-r12h-q1dj-a7b8 |
|
| 10 |
| url |
VCID-rp81-5jrg-jkht |
| vulnerability_id |
VCID-rp81-5jrg-jkht |
| summary |
Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42373 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.2428 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24249 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24331 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24349 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24306 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24407 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24439 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24222 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24288 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42373 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-42373
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rp81-5jrg-jkht |
|
| 11 |
| url |
VCID-svyb-nqje-dbcs |
| vulnerability_id |
VCID-svyb-nqje-dbcs |
| summary |
Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42383 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52144 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.5225 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52188 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52215 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.5218 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52233 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52229 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.5228 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00288 |
| scoring_system |
epss |
| scoring_elements |
0.52264 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42383 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-42383
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.5 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-svyb-nqje-dbcs |
|
| 12 |
| url |
VCID-tkat-gfks-kqg9 |
| vulnerability_id |
VCID-tkat-gfks-kqg9 |
| summary |
Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42374 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20042 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20022 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20189 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20244 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19969 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20049 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20107 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20126 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.2008 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42374 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-42374
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tkat-gfks-kqg9 |
|
| 13 |
| url |
VCID-vjyq-6k64-7fat |
| vulnerability_id |
VCID-vjyq-6k64-7fat |
| summary |
Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42376 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13819 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13766 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13893 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13851 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13815 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13902 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13958 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.1376 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13843 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-42376 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-42376
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vjyq-6k64-7fat |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/busybox@1.34.1-1
|
|
|
pkg:alpm/archlinux/busybox@1.36.1-2
|
alpm
|
archlinux
|
busybox
|
1.36.1-2
|
|
|
true
|
null
|
null
|
| 0 |
| url |
VCID-jjqh-pw7r-buau |
| vulnerability_id |
VCID-jjqh-pw7r-buau |
| summary |
In tar in BusyBox through 1.37.0, a TAR archive can have filenames hidden from a listing through the use of terminal escape sequences. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-46394 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24224 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24333 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24442 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.2429 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24409 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24251 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24308 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00083 |
| scoring_system |
epss |
| scoring_elements |
0.24351 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-46394 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://www.busybox.net |
| reference_id |
www.busybox.net |
| reference_type |
|
| scores |
| 0 |
| value |
3.2 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T15:43:05Z/ |
|
|
| url |
https://www.busybox.net |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-46394
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jjqh-pw7r-buau |
|
|
|
1.6
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/busybox@1.36.1-2
|
|
|
pkg:alpm/archlinux/bzip2@1.0.6-5
|
alpm
|
archlinux
|
bzip2
|
1.0.6-5
|
|
|
true
|
1.0.6-6
|
1.0.6-6
|
| 0 |
| url |
VCID-rgbz-6485-tfan |
| vulnerability_id |
VCID-rgbz-6485-tfan |
| summary |
An use-after-free vulnerability has been found in bzip2 that could
allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-3189 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.23714 |
| scoring_system |
epss |
| scoring_elements |
0.95993 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.23714 |
| scoring_system |
epss |
| scoring_elements |
0.95991 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.23714 |
| scoring_system |
epss |
| scoring_elements |
0.95977 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.23714 |
| scoring_system |
epss |
| scoring_elements |
0.95971 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.23714 |
| scoring_system |
epss |
| scoring_elements |
0.95982 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.23714 |
| scoring_system |
epss |
| scoring_elements |
0.95963 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.23714 |
| scoring_system |
epss |
| scoring_elements |
0.95999 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.23714 |
| scoring_system |
epss |
| scoring_elements |
0.95996 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-3189 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
| reference_url |
https://usn.ubuntu.com/4038-1/ |
| reference_id |
USN-4038-1 |
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/ |
|
|
| url |
https://usn.ubuntu.com/4038-1/ |
|
| 34 |
| reference_url |
https://usn.ubuntu.com/4038-2/ |
| reference_id |
USN-4038-2 |
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/ |
|
|
| url |
https://usn.ubuntu.com/4038-2/ |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-3189
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rgbz-6485-tfan |
|
|
|
3.0
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bzip2@1.0.6-5
|
|
|
pkg:alpm/archlinux/bzip2@1.0.6-6
|
alpm
|
archlinux
|
bzip2
|
1.0.6-6
|
|
|
false
|
null
|
null
|
|
| 0 |
| url |
VCID-rgbz-6485-tfan |
| vulnerability_id |
VCID-rgbz-6485-tfan |
| summary |
An use-after-free vulnerability has been found in bzip2 that could
allow remote attackers to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-3189 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.23714 |
| scoring_system |
epss |
| scoring_elements |
0.95993 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.23714 |
| scoring_system |
epss |
| scoring_elements |
0.95991 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.23714 |
| scoring_system |
epss |
| scoring_elements |
0.95977 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.23714 |
| scoring_system |
epss |
| scoring_elements |
0.95971 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.23714 |
| scoring_system |
epss |
| scoring_elements |
0.95982 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.23714 |
| scoring_system |
epss |
| scoring_elements |
0.95963 |
| published_at |
2026-04-01T12:55:00Z |
|
| 6 |
| value |
0.23714 |
| scoring_system |
epss |
| scoring_elements |
0.95999 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.23714 |
| scoring_system |
epss |
| scoring_elements |
0.95996 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-3189 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
| reference_url |
https://usn.ubuntu.com/4038-1/ |
| reference_id |
USN-4038-1 |
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/ |
|
|
| url |
https://usn.ubuntu.com/4038-1/ |
|
| 34 |
| reference_url |
https://usn.ubuntu.com/4038-2/ |
| reference_id |
USN-4038-2 |
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/ |
|
|
| url |
https://usn.ubuntu.com/4038-2/ |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-3189
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rgbz-6485-tfan |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/bzip2@1.0.6-6
|
|
|
pkg:alpm/archlinux/cacti@1.1.13-1
|
alpm
|
archlinux
|
cacti
|
1.1.13-1
|
|
|
true
|
1.1.14-1
|
1.2.16-2
|
| 0 |
| url |
VCID-afss-mcgj-7bce |
| vulnerability_id |
VCID-afss-mcgj-7bce |
| summary |
Cross-site scripting (XSS) vulnerability in auth_profile.php in Cacti 1.1.13 allows remote attackers to inject arbitrary web script or HTML via specially crafted HTTP Referer headers. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-11691 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66228 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66154 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66195 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66222 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66191 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66239 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66252 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66272 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66259 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-11691 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-11691
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-afss-mcgj-7bce |
|
|
|
3.1
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/cacti@1.1.13-1
|
|
|
pkg:alpm/archlinux/cacti@1.1.14-1
|
alpm
|
archlinux
|
cacti
|
1.1.14-1
|
|
|
false
|
1.1.28-1
|
1.2.16-2
|
|
| 0 |
| url |
VCID-afss-mcgj-7bce |
| vulnerability_id |
VCID-afss-mcgj-7bce |
| summary |
Cross-site scripting (XSS) vulnerability in auth_profile.php in Cacti 1.1.13 allows remote attackers to inject arbitrary web script or HTML via specially crafted HTTP Referer headers. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-11691 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66228 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66154 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66195 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66222 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66191 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66239 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66252 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66272 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66259 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-11691 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-11691
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-afss-mcgj-7bce |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/cacti@1.1.14-1
|
|
|
pkg:alpm/archlinux/cacti@1.1.17-1
|
alpm
|
archlinux
|
cacti
|
1.1.17-1
|
|
|
true
|
1.1.28-1
|
1.2.16-2
|
| 0 |
| url |
VCID-q88b-smmh-77ga |
| vulnerability_id |
VCID-q88b-smmh-77ga |
| summary |
Cacti 1.1.27 allows remote authenticated administrators to conduct Remote Code Execution attacks by placing the Log Path under the web root, and then making a remote_agent.php request containing PHP code in a Client-ip header. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16660 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01457 |
| scoring_system |
epss |
| scoring_elements |
0.80764 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01457 |
| scoring_system |
epss |
| scoring_elements |
0.80772 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01457 |
| scoring_system |
epss |
| scoring_elements |
0.80793 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01457 |
| scoring_system |
epss |
| scoring_elements |
0.8079 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01457 |
| scoring_system |
epss |
| scoring_elements |
0.80817 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01457 |
| scoring_system |
epss |
| scoring_elements |
0.80826 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02642 |
| scoring_system |
epss |
| scoring_elements |
0.85723 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02642 |
| scoring_system |
epss |
| scoring_elements |
0.8572 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02642 |
| scoring_system |
epss |
| scoring_elements |
0.85716 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16660 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-16660
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q88b-smmh-77ga |
|
| 1 |
| url |
VCID-qbvv-frc2-rqbk |
| vulnerability_id |
VCID-qbvv-frc2-rqbk |
| summary |
lib/rrd.php in Cacti 1.1.27 allows remote authenticated administrators to execute arbitrary OS commands via the path_rrdtool parameter in an action=save request to settings.php. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16641 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00465 |
| scoring_system |
epss |
| scoring_elements |
0.64294 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00465 |
| scoring_system |
epss |
| scoring_elements |
0.64351 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00465 |
| scoring_system |
epss |
| scoring_elements |
0.6438 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00465 |
| scoring_system |
epss |
| scoring_elements |
0.64339 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00465 |
| scoring_system |
epss |
| scoring_elements |
0.64387 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00465 |
| scoring_system |
epss |
| scoring_elements |
0.64402 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0126 |
| scoring_system |
epss |
| scoring_elements |
0.79432 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0126 |
| scoring_system |
epss |
| scoring_elements |
0.79415 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0126 |
| scoring_system |
epss |
| scoring_elements |
0.79404 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16641 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-16641
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qbvv-frc2-rqbk |
|
| 2 |
| url |
VCID-x1fg-6mq4-d7ds |
| vulnerability_id |
VCID-x1fg-6mq4-d7ds |
| summary |
Cacti 1.1.27 allows remote authenticated administrators to read arbitrary files by placing the Log Path into a private directory, and then making a clog.php?filename= request, as demonstrated by filename=passwd (with a Log Path under /etc) to read /etc/passwd. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16661 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00112 |
| scoring_system |
epss |
| scoring_elements |
0.29806 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00112 |
| scoring_system |
epss |
| scoring_elements |
0.29711 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00112 |
| scoring_system |
epss |
| scoring_elements |
0.29761 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00181 |
| scoring_system |
epss |
| scoring_elements |
0.39665 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00181 |
| scoring_system |
epss |
| scoring_elements |
0.39812 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00181 |
| scoring_system |
epss |
| scoring_elements |
0.39827 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00181 |
| scoring_system |
epss |
| scoring_elements |
0.39757 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00181 |
| scoring_system |
epss |
| scoring_elements |
0.39814 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00181 |
| scoring_system |
epss |
| scoring_elements |
0.39837 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16661 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-16661
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x1fg-6mq4-d7ds |
|
| 3 |
| url |
VCID-yjny-ubdp-7few |
| vulnerability_id |
VCID-yjny-ubdp-7few |
| summary |
Cacti 1.1.27 has reflected XSS via the PATH_INFO to host.php. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16785 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.40045 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39988 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.40008 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41485 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.4158 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41589 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.4153 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41574 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41603 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16785 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-16785
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yjny-ubdp-7few |
|
|
|
4.0
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/cacti@1.1.17-1
|
|
|
pkg:alpm/archlinux/cacti@1.1.28-1
|
alpm
|
archlinux
|
cacti
|
1.1.28-1
|
|
|
false
|
1.2.16-2
|
1.2.16-2
|
|
| 0 |
| url |
VCID-q88b-smmh-77ga |
| vulnerability_id |
VCID-q88b-smmh-77ga |
| summary |
Cacti 1.1.27 allows remote authenticated administrators to conduct Remote Code Execution attacks by placing the Log Path under the web root, and then making a remote_agent.php request containing PHP code in a Client-ip header. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16660 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01457 |
| scoring_system |
epss |
| scoring_elements |
0.80764 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01457 |
| scoring_system |
epss |
| scoring_elements |
0.80772 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01457 |
| scoring_system |
epss |
| scoring_elements |
0.80793 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01457 |
| scoring_system |
epss |
| scoring_elements |
0.8079 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01457 |
| scoring_system |
epss |
| scoring_elements |
0.80817 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01457 |
| scoring_system |
epss |
| scoring_elements |
0.80826 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.02642 |
| scoring_system |
epss |
| scoring_elements |
0.85723 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.02642 |
| scoring_system |
epss |
| scoring_elements |
0.8572 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.02642 |
| scoring_system |
epss |
| scoring_elements |
0.85716 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16660 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-16660
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q88b-smmh-77ga |
|
| 1 |
| url |
VCID-qbvv-frc2-rqbk |
| vulnerability_id |
VCID-qbvv-frc2-rqbk |
| summary |
lib/rrd.php in Cacti 1.1.27 allows remote authenticated administrators to execute arbitrary OS commands via the path_rrdtool parameter in an action=save request to settings.php. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16641 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00465 |
| scoring_system |
epss |
| scoring_elements |
0.64294 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00465 |
| scoring_system |
epss |
| scoring_elements |
0.64351 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00465 |
| scoring_system |
epss |
| scoring_elements |
0.6438 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00465 |
| scoring_system |
epss |
| scoring_elements |
0.64339 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00465 |
| scoring_system |
epss |
| scoring_elements |
0.64387 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00465 |
| scoring_system |
epss |
| scoring_elements |
0.64402 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.0126 |
| scoring_system |
epss |
| scoring_elements |
0.79432 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.0126 |
| scoring_system |
epss |
| scoring_elements |
0.79415 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.0126 |
| scoring_system |
epss |
| scoring_elements |
0.79404 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16641 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-16641
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qbvv-frc2-rqbk |
|
| 2 |
| url |
VCID-x1fg-6mq4-d7ds |
| vulnerability_id |
VCID-x1fg-6mq4-d7ds |
| summary |
Cacti 1.1.27 allows remote authenticated administrators to read arbitrary files by placing the Log Path into a private directory, and then making a clog.php?filename= request, as demonstrated by filename=passwd (with a Log Path under /etc) to read /etc/passwd. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16661 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00112 |
| scoring_system |
epss |
| scoring_elements |
0.29806 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00112 |
| scoring_system |
epss |
| scoring_elements |
0.29711 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00112 |
| scoring_system |
epss |
| scoring_elements |
0.29761 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00181 |
| scoring_system |
epss |
| scoring_elements |
0.39665 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00181 |
| scoring_system |
epss |
| scoring_elements |
0.39812 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00181 |
| scoring_system |
epss |
| scoring_elements |
0.39827 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00181 |
| scoring_system |
epss |
| scoring_elements |
0.39757 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00181 |
| scoring_system |
epss |
| scoring_elements |
0.39814 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00181 |
| scoring_system |
epss |
| scoring_elements |
0.39837 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16661 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-16661
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x1fg-6mq4-d7ds |
|
| 3 |
| url |
VCID-yjny-ubdp-7few |
| vulnerability_id |
VCID-yjny-ubdp-7few |
| summary |
Cacti 1.1.27 has reflected XSS via the PATH_INFO to host.php. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16785 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.40045 |
| published_at |
2026-04-11T12:55:00Z |
|
| 1 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.39988 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00182 |
| scoring_system |
epss |
| scoring_elements |
0.40008 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41485 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.4158 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41589 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.4153 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41574 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00196 |
| scoring_system |
epss |
| scoring_elements |
0.41603 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-16785 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-16785
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-yjny-ubdp-7few |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/cacti@1.1.28-1
|
|
|
pkg:alpm/archlinux/cacti@1.2.16-1
|
alpm
|
archlinux
|
cacti
|
1.2.16-1
|
|
|
true
|
1.2.16-2
|
1.2.16-2
|
| 0 |
| url |
VCID-qvkt-vk55-4bbx |
| vulnerability_id |
VCID-qvkt-vk55-4bbx |
| summary |
A vulnerability in Cacti could lead to remote code execution. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35701 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01839 |
| scoring_system |
epss |
| scoring_elements |
0.82949 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.01839 |
| scoring_system |
epss |
| scoring_elements |
0.82885 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01839 |
| scoring_system |
epss |
| scoring_elements |
0.82901 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01839 |
| scoring_system |
epss |
| scoring_elements |
0.82914 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01839 |
| scoring_system |
epss |
| scoring_elements |
0.8291 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01839 |
| scoring_system |
epss |
| scoring_elements |
0.82936 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01839 |
| scoring_system |
epss |
| scoring_elements |
0.82943 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01839 |
| scoring_system |
epss |
| scoring_elements |
0.82958 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01839 |
| scoring_system |
epss |
| scoring_elements |
0.82953 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35701 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-35701
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qvkt-vk55-4bbx |
|
|
|
4.0
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/cacti@1.2.16-1
|
|
|
pkg:alpm/archlinux/cacti@1.2.16-2
|
alpm
|
archlinux
|
cacti
|
1.2.16-2
|
|
|
false
|
null
|
null
|
|
| 0 |
| url |
VCID-qvkt-vk55-4bbx |
| vulnerability_id |
VCID-qvkt-vk55-4bbx |
| summary |
A vulnerability in Cacti could lead to remote code execution. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35701 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01839 |
| scoring_system |
epss |
| scoring_elements |
0.82949 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.01839 |
| scoring_system |
epss |
| scoring_elements |
0.82885 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01839 |
| scoring_system |
epss |
| scoring_elements |
0.82901 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01839 |
| scoring_system |
epss |
| scoring_elements |
0.82914 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01839 |
| scoring_system |
epss |
| scoring_elements |
0.8291 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01839 |
| scoring_system |
epss |
| scoring_elements |
0.82936 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01839 |
| scoring_system |
epss |
| scoring_elements |
0.82943 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01839 |
| scoring_system |
epss |
| scoring_elements |
0.82958 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01839 |
| scoring_system |
epss |
| scoring_elements |
0.82953 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35701 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-35701
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qvkt-vk55-4bbx |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/cacti@1.2.16-2
|
|
|
pkg:alpm/archlinux/cairo@1.14.10-1
|
alpm
|
archlinux
|
cairo
|
1.14.10-1
|
|
|
true
|
1.15.8-1
|
1.17.4-5
|
| 0 |
| url |
VCID-m37e-xj39-eqfu |
| vulnerability_id |
VCID-m37e-xj39-eqfu |
| summary |
NULL Pointer Dereference
Cairo is vulnerable to a NULL pointer dereference related to the FT_Load_Glyph and FT_Render_Glyph resulting in an application crash. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7475 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51551 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.5145 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51501 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51528 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51489 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51542 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51539 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51584 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51563 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7475 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-7475, GHSA-5v3f-73gv-x7x5
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m37e-xj39-eqfu |
|
|
|
3.1
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/cairo@1.14.10-1
|
|
|
pkg:alpm/archlinux/cairo@1.15.8-1
|
alpm
|
archlinux
|
cairo
|
1.15.8-1
|
|
|
false
|
1.16.0-2
|
1.17.4-5
|
|
| 0 |
| url |
VCID-m37e-xj39-eqfu |
| vulnerability_id |
VCID-m37e-xj39-eqfu |
| summary |
NULL Pointer Dereference
Cairo is vulnerable to a NULL pointer dereference related to the FT_Load_Glyph and FT_Render_Glyph resulting in an application crash. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7475 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51551 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.5145 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51501 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51528 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51489 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51542 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51539 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51584 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00282 |
| scoring_system |
epss |
| scoring_elements |
0.51563 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-7475 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-7475, GHSA-5v3f-73gv-x7x5
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m37e-xj39-eqfu |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/cairo@1.15.8-1
|
|
|
pkg:alpm/archlinux/cairo@1.16.0-1
|
alpm
|
archlinux
|
cairo
|
1.16.0-1
|
|
|
true
|
1.16.0-2
|
1.17.4-5
|
| 0 |
| url |
VCID-8bnq-c161-2yaq |
| vulnerability_id |
VCID-8bnq-c161-2yaq |
| summary |
cairo: Invalid free in cairo_ft_apply_variations() resulting in a denial of service |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19876 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00303 |
| scoring_system |
epss |
| scoring_elements |
0.53506 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00303 |
| scoring_system |
epss |
| scoring_elements |
0.53585 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00303 |
| scoring_system |
epss |
| scoring_elements |
0.5362 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00303 |
| scoring_system |
epss |
| scoring_elements |
0.53602 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00303 |
| scoring_system |
epss |
| scoring_elements |
0.53529 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00303 |
| scoring_system |
epss |
| scoring_elements |
0.53555 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00303 |
| scoring_system |
epss |
| scoring_elements |
0.53524 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00303 |
| scoring_system |
epss |
| scoring_elements |
0.53574 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00303 |
| scoring_system |
epss |
| scoring_elements |
0.5357 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19876 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-19876
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8bnq-c161-2yaq |
|
|
|
4.5
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/cairo@1.16.0-1
|
|
|
pkg:alpm/archlinux/cairo@1.16.0-2
|
alpm
|
archlinux
|
cairo
|
1.16.0-2
|
|
|
false
|
1.17.4-5
|
1.17.4-5
|
|
| 0 |
| url |
VCID-8bnq-c161-2yaq |
| vulnerability_id |
VCID-8bnq-c161-2yaq |
| summary |
cairo: Invalid free in cairo_ft_apply_variations() resulting in a denial of service |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19876 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00303 |
| scoring_system |
epss |
| scoring_elements |
0.53506 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00303 |
| scoring_system |
epss |
| scoring_elements |
0.53585 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00303 |
| scoring_system |
epss |
| scoring_elements |
0.5362 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.00303 |
| scoring_system |
epss |
| scoring_elements |
0.53602 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.00303 |
| scoring_system |
epss |
| scoring_elements |
0.53529 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00303 |
| scoring_system |
epss |
| scoring_elements |
0.53555 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00303 |
| scoring_system |
epss |
| scoring_elements |
0.53524 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00303 |
| scoring_system |
epss |
| scoring_elements |
0.53574 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00303 |
| scoring_system |
epss |
| scoring_elements |
0.5357 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-19876 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-19876
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8bnq-c161-2yaq |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/cairo@1.16.0-2
|
|
|
pkg:alpm/archlinux/cairo@1.17.4-4
|
alpm
|
archlinux
|
cairo
|
1.17.4-4
|
|
|
true
|
1.17.4-5
|
1.17.4-5
|
| 0 |
| url |
VCID-rzf2-bp8j-27fq |
| vulnerability_id |
VCID-rzf2-bp8j-27fq |
| summary |
A buffer overflow vulnerability has been discovered in Cairo which could result in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35492 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.26976 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.2686 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.26957 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.26961 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.26917 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.27016 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.27053 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.26843 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.26911 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35492 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-35492
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rzf2-bp8j-27fq |
|
|
|
3.5
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/cairo@1.17.4-4
|
|
|
pkg:alpm/archlinux/cairo@1.17.4-5
|
alpm
|
archlinux
|
cairo
|
1.17.4-5
|
|
|
false
|
null
|
null
|
|
| 0 |
| url |
VCID-rzf2-bp8j-27fq |
| vulnerability_id |
VCID-rzf2-bp8j-27fq |
| summary |
A buffer overflow vulnerability has been discovered in Cairo which could result in denial of service. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35492 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.26976 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.2686 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.26957 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.26961 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.26917 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.27016 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.27053 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.26843 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00098 |
| scoring_system |
epss |
| scoring_elements |
0.26911 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-35492 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-35492
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-rzf2-bp8j-27fq |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/cairo@1.17.4-5
|
|
|
pkg:alpm/archlinux/calibre@3.18.0-1
|
alpm
|
archlinux
|
calibre
|
3.18.0-1
|
|
|
true
|
3.19.0-1
|
3.19.0-1
|
| 0 |
| url |
VCID-xhf1-k7jg-6ued |
| vulnerability_id |
VCID-xhf1-k7jg-6ued |
| summary |
gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7889 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.10883 |
| scoring_system |
epss |
| scoring_elements |
0.93385 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.10883 |
| scoring_system |
epss |
| scoring_elements |
0.93354 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.10883 |
| scoring_system |
epss |
| scoring_elements |
0.93362 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.10883 |
| scoring_system |
epss |
| scoring_elements |
0.9337 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.10883 |
| scoring_system |
epss |
| scoring_elements |
0.93377 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.10883 |
| scoring_system |
epss |
| scoring_elements |
0.93381 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.10883 |
| scoring_system |
epss |
| scoring_elements |
0.93386 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7889 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7889
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xhf1-k7jg-6ued |
|
|
|
4.0
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/calibre@3.18.0-1
|
|
|
pkg:alpm/archlinux/calibre@3.19.0-1
|
alpm
|
archlinux
|
calibre
|
3.19.0-1
|
|
|
false
|
null
|
null
|
|
| 0 |
| url |
VCID-xhf1-k7jg-6ued |
| vulnerability_id |
VCID-xhf1-k7jg-6ued |
| summary |
gui2/viewer/bookmarkmanager.py in Calibre 3.18 calls cPickle.load on imported bookmark data, which allows remote attackers to execute arbitrary code via a crafted .pickle file, as demonstrated by Python code that contains an os.system call. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7889 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.10883 |
| scoring_system |
epss |
| scoring_elements |
0.93385 |
| published_at |
2026-04-12T12:55:00Z |
|
| 1 |
| value |
0.10883 |
| scoring_system |
epss |
| scoring_elements |
0.93354 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.10883 |
| scoring_system |
epss |
| scoring_elements |
0.93362 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.10883 |
| scoring_system |
epss |
| scoring_elements |
0.9337 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.10883 |
| scoring_system |
epss |
| scoring_elements |
0.93377 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.10883 |
| scoring_system |
epss |
| scoring_elements |
0.93381 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.10883 |
| scoring_system |
epss |
| scoring_elements |
0.93386 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-7889 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-7889
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xhf1-k7jg-6ued |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/calibre@3.19.0-1
|
|
|
pkg:alpm/archlinux/c-ares@1.11.0-1
|
alpm
|
archlinux
|
c-ares
|
1.11.0-1
|
|
|
true
|
1.13.0-1
|
1.17.2-1
|
| 0 |
| url |
VCID-33wk-w9ez-vyd2 |
| vulnerability_id |
VCID-33wk-w9ez-vyd2 |
| summary |
A heap-based buffer overflow in c-ares might allow remote attackers
to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5180 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.18165 |
| scoring_system |
epss |
| scoring_elements |
0.95153 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.18165 |
| scoring_system |
epss |
| scoring_elements |
0.9519 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.18165 |
| scoring_system |
epss |
| scoring_elements |
0.95186 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.18165 |
| scoring_system |
epss |
| scoring_elements |
0.95187 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.18165 |
| scoring_system |
epss |
| scoring_elements |
0.95164 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.18165 |
| scoring_system |
epss |
| scoring_elements |
0.95166 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.18165 |
| scoring_system |
epss |
| scoring_elements |
0.95169 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.18165 |
| scoring_system |
epss |
| scoring_elements |
0.95176 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.18165 |
| scoring_system |
epss |
| scoring_elements |
0.9518 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5180 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-5180
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-33wk-w9ez-vyd2 |
|
|
|
4.0
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/c-ares@1.11.0-1
|
|
|
pkg:alpm/archlinux/c-ares@1.12.0-1
|
alpm
|
archlinux
|
c-ares
|
1.12.0-1
|
|
|
true
|
1.13.0-1
|
1.17.2-1
|
| 0 |
| url |
VCID-w3cx-2jcp-pyga |
| vulnerability_id |
VCID-w3cx-2jcp-pyga |
| summary |
c-ares: NAPTR parser out of bounds access |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-1000381 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66165 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66239 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66263 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66284 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66271 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66206 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66233 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66203 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.6625 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-1000381 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-1000381
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-w3cx-2jcp-pyga |
|
|
| 0 |
| url |
VCID-33wk-w9ez-vyd2 |
| vulnerability_id |
VCID-33wk-w9ez-vyd2 |
| summary |
A heap-based buffer overflow in c-ares might allow remote attackers
to cause a Denial of Service condition. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5180 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.18165 |
| scoring_system |
epss |
| scoring_elements |
0.95153 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.18165 |
| scoring_system |
epss |
| scoring_elements |
0.9519 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.18165 |
| scoring_system |
epss |
| scoring_elements |
0.95186 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.18165 |
| scoring_system |
epss |
| scoring_elements |
0.95187 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.18165 |
| scoring_system |
epss |
| scoring_elements |
0.95164 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.18165 |
| scoring_system |
epss |
| scoring_elements |
0.95166 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.18165 |
| scoring_system |
epss |
| scoring_elements |
0.95169 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.18165 |
| scoring_system |
epss |
| scoring_elements |
0.95176 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.18165 |
| scoring_system |
epss |
| scoring_elements |
0.9518 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-5180 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-5180
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-33wk-w9ez-vyd2 |
|
|
3.1
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/c-ares@1.12.0-1
|
|
|
pkg:alpm/archlinux/c-ares@1.13.0-1
|
alpm
|
archlinux
|
c-ares
|
1.13.0-1
|
|
|
false
|
1.17.2-1
|
1.17.2-1
|
|
| 0 |
| url |
VCID-w3cx-2jcp-pyga |
| vulnerability_id |
VCID-w3cx-2jcp-pyga |
| summary |
c-ares: NAPTR parser out of bounds access |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-1000381 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66165 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66239 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66263 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66284 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66271 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66206 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66233 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.66203 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00506 |
| scoring_system |
epss |
| scoring_elements |
0.6625 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-1000381 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2017-1000381
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-w3cx-2jcp-pyga |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/c-ares@1.13.0-1
|
|
|
pkg:alpm/archlinux/c-ares@1.16.1-2
|
alpm
|
archlinux
|
c-ares
|
1.16.1-2
|
|
|
true
|
1.17.2-1
|
1.17.2-1
|
| 0 |
| url |
VCID-m4sn-7wuq-e3cd |
| vulnerability_id |
VCID-m4sn-7wuq-e3cd |
| summary |
A Denial of Service vulnerability was discovered in c-ares. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8277 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.59168 |
| scoring_system |
epss |
| scoring_elements |
0.98219 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.59168 |
| scoring_system |
epss |
| scoring_elements |
0.98233 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.59168 |
| scoring_system |
epss |
| scoring_elements |
0.98226 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.59168 |
| scoring_system |
epss |
| scoring_elements |
0.9823 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.59168 |
| scoring_system |
epss |
| scoring_elements |
0.98222 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.59168 |
| scoring_system |
epss |
| scoring_elements |
0.98225 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8277 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8277
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m4sn-7wuq-e3cd |
|
|
|
3.4
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/c-ares@1.16.1-2
|
|
|
pkg:alpm/archlinux/c-ares@1.17.1-1
|
alpm
|
archlinux
|
c-ares
|
1.17.1-1
|
|
|
true
|
1.17.2-1
|
1.17.2-1
|
| 0 |
| url |
VCID-1xdz-dku3-qqc4 |
| vulnerability_id |
VCID-1xdz-dku3-qqc4 |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3672 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17144 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17157 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.1731 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17358 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17138 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17229 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17287 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17265 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17216 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3672 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3672
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1xdz-dku3-qqc4 |
|
|
| 0 |
| url |
VCID-m4sn-7wuq-e3cd |
| vulnerability_id |
VCID-m4sn-7wuq-e3cd |
| summary |
A Denial of Service vulnerability was discovered in c-ares. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8277 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.59168 |
| scoring_system |
epss |
| scoring_elements |
0.98219 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.59168 |
| scoring_system |
epss |
| scoring_elements |
0.98233 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.59168 |
| scoring_system |
epss |
| scoring_elements |
0.98226 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.59168 |
| scoring_system |
epss |
| scoring_elements |
0.9823 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.59168 |
| scoring_system |
epss |
| scoring_elements |
0.98222 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.59168 |
| scoring_system |
epss |
| scoring_elements |
0.98225 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-8277 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-8277
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-m4sn-7wuq-e3cd |
|
|
3.1
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/c-ares@1.17.1-1
|
|
|
pkg:alpm/archlinux/c-ares@1.17.2-1
|
alpm
|
archlinux
|
c-ares
|
1.17.2-1
|
|
|
false
|
null
|
null
|
|
| 0 |
| url |
VCID-1xdz-dku3-qqc4 |
| vulnerability_id |
VCID-1xdz-dku3-qqc4 |
| summary |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
A flaw was found in c-ares library, where a missing input validation check of host names returned by DNS (Domain Name Servers) can lead to output of wrong hostnames which might potentially lead to Domain Hijacking. The highest threat from this vulnerability is to confidentiality and integrity as well as system availability. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3672 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17144 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17157 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.1731 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17358 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17138 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17229 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17287 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17265 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17216 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-3672 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-3672
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-1xdz-dku3-qqc4 |
|
|
null
|
http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/c-ares@1.17.2-1
|
|