{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89628?format=json","vulnerability_id":"VCID-q8p1-zmn2-qycy","summary":"security flaw","aliases":[{"alias":"CVE-2003-0720"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/582974?format=json","purl":"pkg:deb/debian/alpine@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/alpine@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582975?format=json","purl":"pkg:deb/debian/alpine@2.24%2Bdfsg1-1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-j774-u18y-z7dc"},{"vulnerability":"VCID-nskz-nvjh-yyff"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/alpine@2.24%252Bdfsg1-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582976?format=json","purl":"pkg:deb/debian/alpine@2.26%2Bdfsg-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/alpine@2.26%252Bdfsg-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582977?format=json","purl":"pkg:deb/debian/alpine@2.26%2Bdfsg-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/alpine@2.26%252Bdfsg-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/582978?format=json","purl":"pkg:deb/debian/alpine@2.26%2Bdfsg-5?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/alpine@2.26%252Bdfsg-5%3Fdistro=trixie"}],"affected_packages":[],"references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0720.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0720.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0720","reference_id":"","reference_type":"","scores":[{"value":"0.19286","scoring_system":"epss","scoring_elements":"0.9533","published_at":"2026-04-01T12:55:00Z"},{"value":"0.19286","scoring_system":"epss","scoring_elements":"0.95341","published_at":"2026-04-02T12:55:00Z"},{"value":"0.19286","scoring_system":"epss","scoring_elements":"0.95347","published_at":"2026-04-04T12:55:00Z"},{"value":"0.19286","scoring_system":"epss","scoring_elements":"0.95351","published_at":"2026-04-07T12:55:00Z"},{"value":"0.19286","scoring_system":"epss","scoring_elements":"0.95358","published_at":"2026-04-08T12:55:00Z"},{"value":"0.19286","scoring_system":"epss","scoring_elements":"0.95361","published_at":"2026-04-09T12:55:00Z"},{"value":"0.19286","scoring_system":"epss","scoring_elements":"0.95366","published_at":"2026-04-12T12:55:00Z"},{"value":"0.19286","scoring_system":"epss","scoring_elements":"0.95368","published_at":"2026-04-13T12:55:00Z"},{"value":"0.19286","scoring_system":"epss","scoring_elements":"0.95375","published_at":"2026-04-16T12:55:00Z"},{"value":"0.19286","scoring_system":"epss","scoring_elements":"0.95378","published_at":"2026-04-18T12:55:00Z"},{"value":"0.19286","scoring_system":"epss","scoring_elements":"0.95381","published_at":"2026-04-24T12:55:00Z"},{"value":"0.19286","scoring_system":"epss","scoring_elements":"0.95383","published_at":"2026-04-26T12:55:00Z"},{"value":"0.19286","scoring_system":"epss","scoring_elements":"0.95385","published_at":"2026-04-29T12:55:00Z"},{"value":"0.19286","scoring_system":"epss","scoring_elements":"0.95394","published_at":"2026-05-05T12:55:00Z"},{"value":"0.19286","scoring_system":"epss","scoring_elements":"0.95401","published_at":"2026-05-07T12:55:00Z"},{"value":"0.19286","scoring_system":"epss","scoring_elements":"0.95408","published_at":"2026-05-09T12:55:00Z"},{"value":"0.19286","scoring_system":"epss","scoring_elements":"0.95414","published_at":"2026-05-11T12:55:00Z"},{"value":"0.19286","scoring_system":"epss","scoring_elements":"0.95418","published_at":"2026-05-12T12:55:00Z"},{"value":"0.19286","scoring_system":"epss","scoring_elements":"0.95431","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0720"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617074","reference_id":"1617074","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617074"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/99.c","reference_id":"OSVDB-9003;CVE-2003-0720","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/99.c"},{"reference_url":"http://www.idefense.com/advisory/09.10.03.txt","reference_id":"OSVDB-9003;CVE-2003-0720","reference_type":"exploit","scores":[],"url":"http://www.idefense.com/advisory/09.10.03.txt"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:273","reference_id":"RHSA-2003:273","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:273"},{"reference_url":"https://access.redhat.com/errata/RHSA-2003:274","reference_id":"RHSA-2003:274","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2003:274"}],"weaknesses":[],"exploits":[{"date_added":"2003-09-15","description":"Pine 4.56 - Remote Buffer Overflow","required_action":null,"due_date":null,"notes":null,"known_ransomware_campaign_use":true,"source_date_published":"2003-09-16","exploit_type":"remote","platform":"linux","source_date_updated":null,"data_source":"Exploit-DB","source_url":"http://www.idefense.com/advisory/09.10.03.txt"}],"severity_range_score":null,"exploitability":null,"weighted_severity":null,"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q8p1-zmn2-qycy"}