[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-USN-3492-1":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-08T14:11:31.067Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":50,"duplicates":51,"related":52,"reserved_at":9,"published_at":62,"modified_at":63,"state":9,"summary":64,"references_raw":66,"kevs":110,"epss":9,"epss_history":111,"metrics":112,"affected":113},"USN-3492-1","libraw vulnerabilities\n\nIt was discovered that LibRaw incorrectly handled photo files. If a user or\nautomated system were tricked into processing a specially crafted photo\nfile, a remote attacker could cause applications linked against LibRaw\nto crash, resulting in a denial of service, or possibly execute arbitrary\ncode\n",null,[],[],[],[14,16,18,20,22,24,26,28,30,32,34,36,38,40,42,44,46,48],{"_key":15},"CVE-2015-3885",{"_key":17},"CVE-2015-8366",{"_key":19},"CVE-2015-8367",{"_key":21},"CVE-2017-13735",{"_key":23},"CVE-2017-14265",{"_key":25},"CVE-2017-14348",{"_key":27},"CVE-2017-14608",{"_key":29},"CVE-2017-6886",{"_key":31},"CVE-2017-6887",{"_key":33},"UBUNTU-CVE-2015-3885",{"_key":35},"UBUNTU-CVE-2015-8366",{"_key":37},"UBUNTU-CVE-2015-8367",{"_key":39},"UBUNTU-CVE-2017-13735",{"_key":41},"UBUNTU-CVE-2017-14265",{"_key":43},"UBUNTU-CVE-2017-14348",{"_key":45},"UBUNTU-CVE-2017-14608",{"_key":47},"UBUNTU-CVE-2017-6886",{"_key":49},"UBUNTU-CVE-2017-6887",[],[],[53,54,55,56,57,58,59,60,61],{"_key":33},{"_key":35},{"_key":37},{"_key":39},{"_key":41},{"_key":43},{"_key":45},{"_key":47},{"_key":49},"2017-11-22T18:27:06.090295Z","2026-02-04T02:58:32.198500Z",{"cisa_kev":65,"cisa_ransomware":65,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[67,73,78,82,86,90,94,98,102,106],{"url":68,"sources":69,"tags":71},"https://ubuntu.com/security/notices/USN-3492-1",[70],"osv_ubuntu",[72],"Advisory",{"url":74,"sources":75,"tags":76},"https://ubuntu.com/security/CVE-2015-3885",[70],[77],"REPORT",{"url":79,"sources":80,"tags":81},"https://ubuntu.com/security/CVE-2015-8366",[70],[77],{"url":83,"sources":84,"tags":85},"https://ubuntu.com/security/CVE-2015-8367",[70],[77],{"url":87,"sources":88,"tags":89},"https://ubuntu.com/security/CVE-2017-6886",[70],[77],{"url":91,"sources":92,"tags":93},"https://ubuntu.com/security/CVE-2017-6887",[70],[77],{"url":95,"sources":96,"tags":97},"https://ubuntu.com/security/CVE-2017-13735",[70],[77],{"url":99,"sources":100,"tags":101},"https://ubuntu.com/security/CVE-2017-14265",[70],[77],{"url":103,"sources":104,"tags":105},"https://ubuntu.com/security/CVE-2017-14348",[70],[77],{"url":107,"sources":108,"tags":109},"https://ubuntu.com/security/CVE-2017-14608",[70],[77],[],[],[],[114],{"ecosystem":115,"name":116,"vendor":117,"product":116,"cpe_part":9,"purl_type":118,"purl_namespace":117,"purl_name":116,"source":9,"versions":119},"Ubuntu","libraw","ubuntu","deb",[120,126],{"version":121,"is_range":122,"range_type":123,"version_start":9,"version_start_type":9,"version_end":124,"version_end_type":125,"fixed_in":9},"lt0_15_4_1ubuntu0_1",true,"ecosystem","0.15.4-1ubuntu0.1","excluding",{"version":127,"is_range":122,"range_type":123,"version_start":9,"version_start_type":9,"version_end":128,"version_end_type":125,"fixed_in":9},"lt0_17_1_1ubuntu0_1","0.17.1-1ubuntu0.1"]