[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-USN-3989-1":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-08T14:11:31.067Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":42,"duplicates":43,"related":44,"reserved_at":9,"published_at":52,"modified_at":53,"state":9,"summary":54,"references_raw":56,"kevs":92,"epss":9,"epss_history":93,"metrics":94,"affected":95},"USN-3989-1","libraw vulnerabilities\n\nIt was discovered that LibRaw incorrectly handled photo files. If a user or\nautomated system were tricked into processing a specially crafted photo\nfile, a remote attacker could cause applications linked against LibRaw to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode.\n",null,[],[],[],[14,16,18,20,22,24,26,28,30,32,34,36,38,40],{"_key":15},"CVE-2018-20337",{"_key":17},"CVE-2018-20363",{"_key":19},"CVE-2018-20364",{"_key":21},"CVE-2018-20365",{"_key":23},"CVE-2018-5817",{"_key":25},"CVE-2018-5818",{"_key":27},"CVE-2018-5819",{"_key":29},"UBUNTU-CVE-2018-20337",{"_key":31},"UBUNTU-CVE-2018-20363",{"_key":33},"UBUNTU-CVE-2018-20364",{"_key":35},"UBUNTU-CVE-2018-20365",{"_key":37},"UBUNTU-CVE-2018-5817",{"_key":39},"UBUNTU-CVE-2018-5818",{"_key":41},"UBUNTU-CVE-2018-5819",[],[],[45,46,47,48,49,50,51],{"_key":29},{"_key":31},{"_key":33},{"_key":35},{"_key":37},{"_key":39},{"_key":41},"2019-05-21T12:54:50.614371Z","2026-02-04T03:29:15.990773Z",{"cisa_kev":55,"cisa_ransomware":55,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[57,63,68,72,76,80,84,88],{"url":58,"sources":59,"tags":61},"https://ubuntu.com/security/notices/USN-3989-1",[60],"osv_ubuntu",[62],"Advisory",{"url":64,"sources":65,"tags":66},"https://ubuntu.com/security/CVE-2018-5817",[60],[67],"REPORT",{"url":69,"sources":70,"tags":71},"https://ubuntu.com/security/CVE-2018-5818",[60],[67],{"url":73,"sources":74,"tags":75},"https://ubuntu.com/security/CVE-2018-5819",[60],[67],{"url":77,"sources":78,"tags":79},"https://ubuntu.com/security/CVE-2018-20337",[60],[67],{"url":81,"sources":82,"tags":83},"https://ubuntu.com/security/CVE-2018-20363",[60],[67],{"url":85,"sources":86,"tags":87},"https://ubuntu.com/security/CVE-2018-20364",[60],[67],{"url":89,"sources":90,"tags":91},"https://ubuntu.com/security/CVE-2018-20365",[60],[67],[],[],[],[96],{"ecosystem":97,"name":98,"vendor":99,"product":98,"cpe_part":9,"purl_type":100,"purl_namespace":99,"purl_name":98,"source":9,"versions":101},"Ubuntu","libraw","ubuntu","deb",[102,108],{"version":103,"is_range":104,"range_type":105,"version_start":9,"version_start_type":9,"version_end":106,"version_end_type":107,"fixed_in":9},"lt0_17_1_1ubuntu0_5",true,"ecosystem","0.17.1-1ubuntu0.5","excluding",{"version":109,"is_range":104,"range_type":105,"version_start":9,"version_start_type":9,"version_end":110,"version_end_type":107,"fixed_in":9},"lt0_18_8_1ubuntu0_3","0.18.8-1ubuntu0.3"]