[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-USN-3838-1":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-08T20:11:31.826Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":42,"duplicates":43,"related":44,"reserved_at":9,"published_at":56,"modified_at":57,"state":9,"summary":58,"references_raw":60,"kevs":96,"epss":9,"epss_history":97,"metrics":98,"affected":99},"USN-3838-1","libraw vulnerabilities\n\nIt was discovered that LibRaw incorrectly handled photo files. If a user or\nautomated system were tricked into processing a specially crafted photo file, a\nremote attacker could cause applications linked against LibRaw to crash,\nresulting in a denial of service, or possibly execute arbitrary code.\n",null,[],[],[],[14,16,18,20,22,24,26,28,30,32,34,36,38,40],{"_key":15},"CVE-2018-5807",{"_key":17},"CVE-2018-5810",{"_key":19},"CVE-2018-5811",{"_key":21},"CVE-2018-5812",{"_key":23},"CVE-2018-5813",{"_key":25},"CVE-2018-5815",{"_key":27},"CVE-2018-5816",{"_key":29},"UBUNTU-CVE-2018-5807",{"_key":31},"UBUNTU-CVE-2018-5810",{"_key":33},"UBUNTU-CVE-2018-5811",{"_key":35},"UBUNTU-CVE-2018-5812",{"_key":37},"UBUNTU-CVE-2018-5813",{"_key":39},"UBUNTU-CVE-2018-5815",{"_key":41},"UBUNTU-CVE-2018-5816",[],[],[45,46,48,50,51,52,53,54,55],{"_key":29},{"_key":47},"UBUNTU-CVE-2018-5808",{"_key":49},"UBUNTU-CVE-2018-5809",{"_key":31},{"_key":33},{"_key":35},{"_key":37},{"_key":39},{"_key":41},"2018-12-06T02:25:05.459593Z","2026-02-04T04:18:08.340819Z",{"cisa_kev":59,"cisa_ransomware":59,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[61,67,72,76,80,84,88,92],{"url":62,"sources":63,"tags":65},"https://ubuntu.com/security/notices/USN-3838-1",[64],"osv_ubuntu",[66],"Advisory",{"url":68,"sources":69,"tags":70},"https://ubuntu.com/security/CVE-2018-5807",[64],[71],"REPORT",{"url":73,"sources":74,"tags":75},"https://ubuntu.com/security/CVE-2018-5810",[64],[71],{"url":77,"sources":78,"tags":79},"https://ubuntu.com/security/CVE-2018-5811",[64],[71],{"url":81,"sources":82,"tags":83},"https://ubuntu.com/security/CVE-2018-5812",[64],[71],{"url":85,"sources":86,"tags":87},"https://ubuntu.com/security/CVE-2018-5813",[64],[71],{"url":89,"sources":90,"tags":91},"https://ubuntu.com/security/CVE-2018-5815",[64],[71],{"url":93,"sources":94,"tags":95},"https://ubuntu.com/security/CVE-2018-5816",[64],[71],[],[],[],[100],{"ecosystem":101,"name":102,"vendor":103,"product":102,"cpe_part":9,"purl_type":104,"purl_namespace":103,"purl_name":102,"source":9,"versions":105},"Ubuntu","libraw","ubuntu","deb",[106,112,115],{"version":107,"is_range":108,"range_type":109,"version_start":9,"version_start_type":9,"version_end":110,"version_end_type":111,"fixed_in":9},"lt0_15_4_1ubuntu0_3",true,"ecosystem","0.15.4-1ubuntu0.3","excluding",{"version":113,"is_range":108,"range_type":109,"version_start":9,"version_start_type":9,"version_end":114,"version_end_type":111,"fixed_in":9},"lt0_17_1_1ubuntu0_4","0.17.1-1ubuntu0.4",{"version":116,"is_range":108,"range_type":109,"version_start":9,"version_start_type":9,"version_end":117,"version_end_type":111,"fixed_in":9},"lt0_18_8_1ubuntu0_2","0.18.8-1ubuntu0.2"]