Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/103804?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/103804?format=api", "vulnerability_id": "VCID-1vwp-yqcr-nkg6", "summary": "Multiple SSH2 servers and clients do not properly handle large packets or large fields, which may allow remote attackers to cause a denial of service or possibly execute arbitrary code via buffer overflow attacks, as demonstrated by the SSHredder SSH protocol test suite.", "aliases": [ { "alias": "CVE-2002-1359" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/933883?format=api", "purl": "pkg:deb/debian/openssh@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/933878?format=api", "purl": "pkg:deb/debian/openssh@1:8.4p1-5%2Bdeb11u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-792n-jkzj-qqhd" }, { "vulnerability": "VCID-8efr-budq-6bb6" }, { "vulnerability": "VCID-a4eq-r71a-buhm" }, { "vulnerability": "VCID-a7m6-uqbt-nqd9" }, { "vulnerability": "VCID-ajmg-5kgx-k7h5" }, { "vulnerability": "VCID-b4uc-yh56-muej" }, { "vulnerability": "VCID-bnrq-2fsr-mfgd" }, { "vulnerability": "VCID-kgn5-p8kx-qucj" }, { "vulnerability": "VCID-wga4-sqwk-4bfj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:8.4p1-5%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/933876?format=api", "purl": "pkg:deb/debian/openssh@1:9.2p1-2%2Bdeb12u7?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-792n-jkzj-qqhd" }, { "vulnerability": "VCID-8efr-budq-6bb6" }, { "vulnerability": "VCID-a4eq-r71a-buhm" }, { "vulnerability": "VCID-a7m6-uqbt-nqd9" }, { "vulnerability": "VCID-ajmg-5kgx-k7h5" }, { "vulnerability": "VCID-bnrq-2fsr-mfgd" }, { "vulnerability": "VCID-kgn5-p8kx-qucj" }, { "vulnerability": "VCID-wga4-sqwk-4bfj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:9.2p1-2%252Bdeb12u7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/933880?format=api", "purl": "pkg:deb/debian/openssh@1:10.0p1-7%2Bdeb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-792n-jkzj-qqhd" }, { "vulnerability": "VCID-8efr-budq-6bb6" }, { "vulnerability": "VCID-a4eq-r71a-buhm" }, { "vulnerability": "VCID-ajmg-5kgx-k7h5" }, { "vulnerability": "VCID-bnrq-2fsr-mfgd" }, { "vulnerability": "VCID-kgn5-p8kx-qucj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.0p1-7%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/933879?format=api", "purl": "pkg:deb/debian/openssh@1:10.2p1-6?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-792n-jkzj-qqhd" }, { "vulnerability": "VCID-8efr-budq-6bb6" }, { "vulnerability": "VCID-a4eq-r71a-buhm" }, { "vulnerability": "VCID-bnrq-2fsr-mfgd" }, { "vulnerability": "VCID-kgn5-p8kx-qucj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.2p1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1062514?format=api", "purl": "pkg:deb/debian/openssh@1:10.3p1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1103028?format=api", "purl": "pkg:deb/debian/openssh@1:10.3p1-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssh@1:10.3p1-2%3Fdistro=trixie" } ], "affected_packages": [], "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2002-1359", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.86998", "scoring_system": "epss", "scoring_elements": "0.9943", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.86998", "scoring_system": "epss", "scoring_elements": "0.99429", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.86998", "scoring_system": "epss", "scoring_elements": "0.99431", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.86998", "scoring_system": "epss", "scoring_elements": "0.99433", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.86998", "scoring_system": "epss", "scoring_elements": "0.99435", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.86998", "scoring_system": "epss", "scoring_elements": "0.99436", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.86998", "scoring_system": "epss", "scoring_elements": "0.99439", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.86998", "scoring_system": "epss", "scoring_elements": "0.99438", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.86998", "scoring_system": "epss", "scoring_elements": "0.9944", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.86998", "scoring_system": "epss", "scoring_elements": "0.99441", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.86998", "scoring_system": "epss", "scoring_elements": "0.99442", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.86998", "scoring_system": "epss", "scoring_elements": "0.99443", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.86998", "scoring_system": "epss", "scoring_elements": "0.99445", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.86998", "scoring_system": "epss", "scoring_elements": "0.99446", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2002-1359" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/1788.pm", "reference_id": "CVE-2002-1359", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/1788.pm" }, { "reference_url": "http://www.rapid7.com/advisories/R7-0009.html", "reference_id": "CVE-2002-1359", "reference_type": "exploit", "scores": [], "url": "http://www.rapid7.com/advisories/R7-0009.html" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/16463.rb", "reference_id": "CVE-2002-1359;OSVDB-8044", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/16463.rb" } ], "weaknesses": [], "exploits": [ { "date_added": "2006-05-14", "description": "PuTTy.exe 0.53 - Validation Remote Buffer Overflow (Metasploit)", "required_action": null, "due_date": null, "notes": null, "known_ransomware_campaign_use": true, "source_date_published": "2006-05-15", "exploit_type": "remote", "platform": "windows", "source_date_updated": "2016-07-29", "data_source": "Exploit-DB", "source_url": "http://www.rapid7.com/advisories/R7-0009.html" }, { "date_added": null, "description": "This module exploits a buffer overflow in the PuTTY SSH client that is\n triggered through a validation error in SSH.c. This vulnerability\n affects versions 0.53 and earlier.", "required_action": null, "due_date": null, "notes": "Reliability:\n - unknown-reliability\nStability:\n - unknown-stability\nSideEffects:\n - unknown-side-effects\n", "known_ransomware_campaign_use": false, "source_date_published": "2002-12-16", "exploit_type": null, "platform": "Windows", "source_date_updated": null, "data_source": "Metasploit", "source_url": "https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/windows/ssh/putty_msg_debug.rb" } ], "severity_range_score": null, "exploitability": null, "weighted_severity": null, "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1vwp-yqcr-nkg6" }