{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31862?format=json","vulnerability_id":"VCID-y5u5-dgk3-u3da","summary":"A vulnerability has been found in AIDE which can lead to root privilege escalation.","aliases":[{"alias":"CVE-2021-45417"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038366?format=json","purl":"pkg:deb/debian/aide@0.16.1-1%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-mygm-b1qy-t3f2"},{"vulnerability":"VCID-vtsx-1zca-8bet"},{"vulnerability":"VCID-y5u5-dgk3-u3da"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/aide@0.16.1-1%252Bdeb10u1"},{"url":"http://public2.vulnerablecode.io/api/packages/586789?format=json","purl":"pkg:deb/debian/aide@0.17.3-4%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/aide@0.17.3-4%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1056123?format=json","purl":"pkg:deb/debian/aide@0.17.3-4%2Bdeb11u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-mygm-b1qy-t3f2"},{"vulnerability":"VCID-vtsx-1zca-8bet"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/aide@0.17.3-4%252Bdeb11u2"},{"url":"http://public2.vulnerablecode.io/api/packages/584630?format=json","purl":"pkg:deb/debian/aide@0.17.3-4%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/aide@0.17.3-4%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/586790?format=json","purl":"pkg:deb/debian/aide@0.17.4-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/aide@0.17.4-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584631?format=json","purl":"pkg:deb/debian/aide@0.18.3-1%2Bdeb12u4?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/aide@0.18.3-1%252Bdeb12u4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584632?format=json","purl":"pkg:deb/debian/aide@0.19.1-2%2Bdeb13u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/aide@0.19.1-2%252Bdeb13u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/584633?format=json","purl":"pkg:deb/debian/aide@0.19.2-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/aide@0.19.2-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/71981?format=json","purl":"pkg:ebuild/app-forensics/aide@0.17.4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-forensics/aide@0.17.4"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038356?format=json","purl":"pkg:deb/debian/aide@0.8-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vu9-xzw9-kfe2"},{"vulnerability":"VCID-mygm-b1qy-t3f2"},{"vulnerability":"VCID-vtsx-1zca-8bet"},{"vulnerability":"VCID-y5u5-dgk3-u3da"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/aide@0.8-2"},{"url":"http://public2.vulnerablecode.io/api/packages/1038357?format=json","purl":"pkg:deb/debian/aide@0.10-6.1sarge2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-1vu9-xzw9-kfe2"},{"vulnerability":"VCID-mygm-b1qy-t3f2"},{"vulnerability":"VCID-vtsx-1zca-8bet"},{"vulnerability":"VCID-y5u5-dgk3-u3da"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/aide@0.10-6.1sarge2"},{"url":"http://public2.vulnerablecode.io/api/packages/1038358?format=json","purl":"pkg:deb/debian/aide@0.13.1-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-mygm-b1qy-t3f2"},{"vulnerability":"VCID-vtsx-1zca-8bet"},{"vulnerability":"VCID-y5u5-dgk3-u3da"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/aide@0.13.1-2"},{"url":"http://public2.vulnerablecode.io/api/packages/1038359?format=json","purl":"pkg:deb/debian/aide@0.13.1-10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-mygm-b1qy-t3f2"},{"vulnerability":"VCID-vtsx-1zca-8bet"},{"vulnerability":"VCID-y5u5-dgk3-u3da"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/aide@0.13.1-10"},{"url":"http://public2.vulnerablecode.io/api/packages/1038360?format=json","purl":"pkg:deb/debian/aide@0.15.1-2%2Bsqueeze1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-mygm-b1qy-t3f2"},{"vulnerability":"VCID-vtsx-1zca-8bet"},{"vulnerability":"VCID-y5u5-dgk3-u3da"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/aide@0.15.1-2%252Bsqueeze1"},{"url":"http://public2.vulnerablecode.io/api/packages/1038361?format=json","purl":"pkg:deb/debian/aide@0.15.1-8","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-mygm-b1qy-t3f2"},{"vulnerability":"VCID-vtsx-1zca-8bet"},{"vulnerability":"VCID-y5u5-dgk3-u3da"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/aide@0.15.1-8"},{"url":"http://public2.vulnerablecode.io/api/packages/1038362?format=json","purl":"pkg:deb/debian/aide@0.16~a2.git20130520-3~bpo70%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-mygm-b1qy-t3f2"},{"vulnerability":"VCID-vtsx-1zca-8bet"},{"vulnerability":"VCID-y5u5-dgk3-u3da"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/aide@0.16~a2.git20130520-3~bpo70%252B1"},{"url":"http://public2.vulnerablecode.io/api/packages/1038363?format=json","purl":"pkg:deb/debian/aide@0.16~a2.git20130520-3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-mygm-b1qy-t3f2"},{"vulnerability":"VCID-vtsx-1zca-8bet"},{"vulnerability":"VCID-y5u5-dgk3-u3da"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/aide@0.16~a2.git20130520-3"},{"url":"http://public2.vulnerablecode.io/api/packages/1038364?format=json","purl":"pkg:deb/debian/aide@0.16-1~bpo8%2B1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-mygm-b1qy-t3f2"},{"vulnerability":"VCID-vtsx-1zca-8bet"},{"vulnerability":"VCID-y5u5-dgk3-u3da"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/aide@0.16-1~bpo8%252B1"},{"url":"http://public2.vulnerablecode.io/api/packages/1038365?format=json","purl":"pkg:deb/debian/aide@0.16-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-mygm-b1qy-t3f2"},{"vulnerability":"VCID-vtsx-1zca-8bet"},{"vulnerability":"VCID-y5u5-dgk3-u3da"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/aide@0.16-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1038366?format=json","purl":"pkg:deb/debian/aide@0.16.1-1%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-mygm-b1qy-t3f2"},{"vulnerability":"VCID-vtsx-1zca-8bet"},{"vulnerability":"VCID-y5u5-dgk3-u3da"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/aide@0.16.1-1%252Bdeb10u1"},{"url":"http://public2.vulnerablecode.io/api/packages/99455?format=json","purl":"pkg:rpm/redhat/aide@0.14-11.el6_10?arch=1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-y5u5-dgk3-u3da"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/aide@0.14-11.el6_10%3Farch=1"},{"url":"http://public2.vulnerablecode.io/api/packages/99450?format=json","purl":"pkg:rpm/redhat/aide@0.15.1-13.el7_9?arch=1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-y5u5-dgk3-u3da"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/aide@0.15.1-13.el7_9%3Farch=1"},{"url":"http://public2.vulnerablecode.io/api/packages/99451?format=json","purl":"pkg:rpm/redhat/aide@0.16-11.el8_1?arch=1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-y5u5-dgk3-u3da"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/aide@0.16-11.el8_1%3Farch=1"},{"url":"http://public2.vulnerablecode.io/api/packages/99453?format=json","purl":"pkg:rpm/redhat/aide@0.16-11.el8_2?arch=1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-y5u5-dgk3-u3da"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/aide@0.16-11.el8_2%3Farch=1"},{"url":"http://public2.vulnerablecode.io/api/packages/99454?format=json","purl":"pkg:rpm/redhat/aide@0.16-14.el8_4?arch=1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-y5u5-dgk3-u3da"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/aide@0.16-14.el8_4%3Farch=1"},{"url":"http://public2.vulnerablecode.io/api/packages/99452?format=json","purl":"pkg:rpm/redhat/aide@0.16-14.el8_5?arch=1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-y5u5-dgk3-u3da"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/aide@0.16-14.el8_5%3Farch=1"},{"url":"http://public2.vulnerablecode.io/api/packages/99217?format=json","purl":"pkg:rpm/redhat/redhat-virtualization-host@4.3.22-20220330.1?arch=el7_9","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-45du-dgkd-p3b8"},{"vulnerability":"VCID-cy2n-zexk-jyda"},{"vulnerability":"VCID-gsbn-6t86-7kf9"},{"vulnerability":"VCID-m1fw-z29h-ubdn"},{"vulnerability":"VCID-mddr-7zar-6kfn"},{"vulnerability":"VCID-ms42-54h5-2kfa"},{"vulnerability":"VCID-nw7y-2xct-8fa5"},{"vulnerability":"VCID-tqsm-2e4k-aycp"},{"vulnerability":"VCID-txgc-kd7n-ekc6"},{"vulnerability":"VCID-u4gb-1hyn-m7g4"},{"vulnerability":"VCID-ukce-7qpu-c7cm"},{"vulnerability":"VCID-y5u5-dgk3-u3da"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/redhat-virtualization-host@4.3.22-20220330.1%3Farch=el7_9"},{"url":"http://public2.vulnerablecode.io/api/packages/99428?format=json","purl":"pkg:rpm/redhat/redhat-virtualization-host@4.4.10-202202081536_8?arch=5","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-45du-dgkd-p3b8"},{"vulnerability":"VCID-rbaq-2dap-y7bt"},{"vulnerability":"VCID-y5u5-dgk3-u3da"},{"vulnerability":"VCID-yee7-fp2m-r7eg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/redhat-virtualization-host@4.4.10-202202081536_8%3Farch=5"}],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45417.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45417.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45417","reference_id":"","reference_type":"","scores":[{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11285","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11425","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11484","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11272","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11354","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11412","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11419","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11387","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11357","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11216","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11219","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11347","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11288","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11248","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11187","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11119","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11249","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11308","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11276","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11317","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1137","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-45417"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45417","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45417"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041489","reference_id":"2041489","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041489"},{"reference_url":"https://security.gentoo.org/glsa/202311-07","reference_id":"GLSA-202311-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202311-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0440","reference_id":"RHSA-2022:0440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0441","reference_id":"RHSA-2022:0441","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0441"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0456","reference_id":"RHSA-2022:0456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0456"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0464","reference_id":"RHSA-2022:0464","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0464"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0472","reference_id":"RHSA-2022:0472","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0472"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0473","reference_id":"RHSA-2022:0473","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0473"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:0540","reference_id":"RHSA-2022:0540","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:0540"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1263","reference_id":"RHSA-2022:1263","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1263"},{"reference_url":"https://usn.ubuntu.com/5243-1/","reference_id":"USN-5243-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5243-1/"},{"reference_url":"https://usn.ubuntu.com/5243-2/","reference_id":"USN-5243-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5243-2/"}],"weaknesses":[{"cwe_id":787,"name":"Out-of-bounds Write","description":"The product writes data past the end, or before the beginning, of the intended buffer."}],"exploits":[],"severity_range_score":"7.0 - 7.5","exploitability":"0.5","weighted_severity":"6.8","risk_score":3.4,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y5u5-dgk3-u3da"}