Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/gzip@1.3.12-6%2Blenny1
Typedeb
Namespacedebian
Namegzip
Version1.3.12-6+lenny1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.10-4+deb11u1
Latest_non_vulnerable_version1.10-4+deb11u1
Affected_by_vulnerabilities
0
url VCID-1yf3-td2x-xffn
vulnerability_id VCID-1yf3-td2x-xffn
summary
This GLSA contains notification of vulnerabilities found in several
    Gentoo packages which have been fixed prior to January 1, 2011. The worst
    of these vulnerabilities could lead to local privilege escalation and
    remote code execution. Please see the package list and CVE identifiers
    below for more information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2624.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2624.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2624
reference_id
reference_type
scores
0
value 0.07318
scoring_system epss
scoring_elements 0.91645
published_at 2026-04-01T12:55:00Z
1
value 0.07318
scoring_system epss
scoring_elements 0.91653
published_at 2026-04-02T12:55:00Z
2
value 0.07318
scoring_system epss
scoring_elements 0.91658
published_at 2026-04-04T12:55:00Z
3
value 0.07318
scoring_system epss
scoring_elements 0.91667
published_at 2026-04-07T12:55:00Z
4
value 0.07318
scoring_system epss
scoring_elements 0.9168
published_at 2026-04-08T12:55:00Z
5
value 0.07318
scoring_system epss
scoring_elements 0.91686
published_at 2026-04-09T12:55:00Z
6
value 0.07318
scoring_system epss
scoring_elements 0.9169
published_at 2026-04-11T12:55:00Z
7
value 0.07318
scoring_system epss
scoring_elements 0.91691
published_at 2026-04-12T12:55:00Z
8
value 0.07318
scoring_system epss
scoring_elements 0.91688
published_at 2026-04-13T12:55:00Z
9
value 0.07318
scoring_system epss
scoring_elements 0.91709
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2624
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2624
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507263
reference_id 507263
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507263
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=514711
reference_id 514711
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=514711
5
reference_url https://security.gentoo.org/glsa/201412-08
reference_id GLSA-201412-08
reference_type
scores
url https://security.gentoo.org/glsa/201412-08
6
reference_url https://usn.ubuntu.com/889-1/
reference_id USN-889-1
reference_type
scores
url https://usn.ubuntu.com/889-1/
fixed_packages
0
url pkg:deb/debian/gzip@1.3.12-9%2Bsqueeze1
purl pkg:deb/debian/gzip@1.3.12-9%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3adf-qttu-3kfd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.12-9%252Bsqueeze1
aliases CVE-2009-2624
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1yf3-td2x-xffn
1
url VCID-3adf-qttu-3kfd
vulnerability_id VCID-3adf-qttu-3kfd
summary A vulnerability has been discovered in GNU Gzip and XZ Utils' grep helpers which could result in writes to arbitrary files.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1271.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1271.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1271
reference_id
reference_type
scores
0
value 0.00813
scoring_system epss
scoring_elements 0.74292
published_at 2026-04-16T12:55:00Z
1
value 0.00813
scoring_system epss
scoring_elements 0.74207
published_at 2026-04-01T12:55:00Z
2
value 0.00813
scoring_system epss
scoring_elements 0.74213
published_at 2026-04-02T12:55:00Z
3
value 0.00813
scoring_system epss
scoring_elements 0.7424
published_at 2026-04-04T12:55:00Z
4
value 0.00813
scoring_system epss
scoring_elements 0.74212
published_at 2026-04-07T12:55:00Z
5
value 0.00813
scoring_system epss
scoring_elements 0.74245
published_at 2026-04-08T12:55:00Z
6
value 0.00813
scoring_system epss
scoring_elements 0.74259
published_at 2026-04-09T12:55:00Z
7
value 0.00813
scoring_system epss
scoring_elements 0.74281
published_at 2026-04-11T12:55:00Z
8
value 0.00813
scoring_system epss
scoring_elements 0.74261
published_at 2026-04-12T12:55:00Z
9
value 0.00813
scoring_system epss
scoring_elements 0.74254
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1271
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009167
reference_id 1009167
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009167
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009168
reference_id 1009168
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009168
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2073310
reference_id 2073310
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2073310
7
reference_url https://www.openwall.com/lists/oss-security/2022/04/07/8
reference_id 8
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://www.openwall.com/lists/oss-security/2022/04/07/8
8
reference_url https://security.archlinux.org/ASA-202204-7
reference_id ASA-202204-7
reference_type
scores
url https://security.archlinux.org/ASA-202204-7
9
reference_url https://security.archlinux.org/ASA-202204-8
reference_id ASA-202204-8
reference_type
scores
url https://security.archlinux.org/ASA-202204-8
10
reference_url https://security.archlinux.org/AVG-2665
reference_id AVG-2665
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2665
11
reference_url https://security.archlinux.org/AVG-2666
reference_id AVG-2666
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2666
12
reference_url https://access.redhat.com/security/cve/CVE-2022-1271
reference_id CVE-2022-1271
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://access.redhat.com/security/cve/CVE-2022-1271
13
reference_url https://security-tracker.debian.org/tracker/CVE-2022-1271
reference_id CVE-2022-1271
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://security-tracker.debian.org/tracker/CVE-2022-1271
14
reference_url https://security.gentoo.org/glsa/202209-01
reference_id GLSA-202209-01
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://security.gentoo.org/glsa/202209-01
15
reference_url https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
16
reference_url https://security.netapp.com/advisory/ntap-20220930-0006/
reference_id ntap-20220930-0006
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://security.netapp.com/advisory/ntap-20220930-0006/
17
reference_url https://git.tukaani.org/?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6
reference_id ?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://git.tukaani.org/?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6
18
reference_url https://access.redhat.com/errata/RHSA-2022:1537
reference_id RHSA-2022:1537
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1537
19
reference_url https://access.redhat.com/errata/RHSA-2022:1592
reference_id RHSA-2022:1592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1592
20
reference_url https://access.redhat.com/errata/RHSA-2022:1665
reference_id RHSA-2022:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1665
21
reference_url https://access.redhat.com/errata/RHSA-2022:1676
reference_id RHSA-2022:1676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1676
22
reference_url https://access.redhat.com/errata/RHSA-2022:2191
reference_id RHSA-2022:2191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2191
23
reference_url https://access.redhat.com/errata/RHSA-2022:4582
reference_id RHSA-2022:4582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4582
24
reference_url https://access.redhat.com/errata/RHSA-2022:4896
reference_id RHSA-2022:4896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4896
25
reference_url https://access.redhat.com/errata/RHSA-2022:4940
reference_id RHSA-2022:4940
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4940
26
reference_url https://access.redhat.com/errata/RHSA-2022:4991
reference_id RHSA-2022:4991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4991
27
reference_url https://access.redhat.com/errata/RHSA-2022:4992
reference_id RHSA-2022:4992
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4992
28
reference_url https://access.redhat.com/errata/RHSA-2022:4993
reference_id RHSA-2022:4993
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4993
29
reference_url https://access.redhat.com/errata/RHSA-2022:4994
reference_id RHSA-2022:4994
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4994
30
reference_url https://access.redhat.com/errata/RHSA-2022:5052
reference_id RHSA-2022:5052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5052
31
reference_url https://access.redhat.com/errata/RHSA-2022:5439
reference_id RHSA-2022:5439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5439
32
reference_url https://usn.ubuntu.com/5378-1/
reference_id USN-5378-1
reference_type
scores
url https://usn.ubuntu.com/5378-1/
33
reference_url https://usn.ubuntu.com/5378-2/
reference_id USN-5378-2
reference_type
scores
url https://usn.ubuntu.com/5378-2/
34
reference_url https://usn.ubuntu.com/5378-3/
reference_id USN-5378-3
reference_type
scores
url https://usn.ubuntu.com/5378-3/
35
reference_url https://usn.ubuntu.com/5378-4/
reference_id USN-5378-4
reference_type
scores
url https://usn.ubuntu.com/5378-4/
36
reference_url https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch
reference_id xzgrep-ZDI-CAN-16587.patch
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch
fixed_packages
0
url pkg:deb/debian/gzip@1.9-3%2Bdeb10u1
purl pkg:deb/debian/gzip@1.9-3%2Bdeb10u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3adf-qttu-3kfd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.9-3%252Bdeb10u1
1
url pkg:deb/debian/gzip@1.10-4%2Bdeb11u1
purl pkg:deb/debian/gzip@1.10-4%2Bdeb11u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1
aliases CVE-2022-1271
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3adf-qttu-3kfd
2
url VCID-vm8g-v83d-mbfm
vulnerability_id VCID-vm8g-v83d-mbfm
summary
This GLSA contains notification of vulnerabilities found in several
    Gentoo packages which have been fixed prior to January 1, 2011. The worst
    of these vulnerabilities could lead to local privilege escalation and
    remote code execution. Please see the package list and CVE identifiers
    below for more information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0001.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0001.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0001
reference_id
reference_type
scores
0
value 0.22601
scoring_system epss
scoring_elements 0.95813
published_at 2026-04-01T12:55:00Z
1
value 0.22601
scoring_system epss
scoring_elements 0.95822
published_at 2026-04-02T12:55:00Z
2
value 0.22601
scoring_system epss
scoring_elements 0.9583
published_at 2026-04-04T12:55:00Z
3
value 0.22601
scoring_system epss
scoring_elements 0.95832
published_at 2026-04-07T12:55:00Z
4
value 0.22601
scoring_system epss
scoring_elements 0.95841
published_at 2026-04-08T12:55:00Z
5
value 0.22601
scoring_system epss
scoring_elements 0.95845
published_at 2026-04-09T12:55:00Z
6
value 0.22601
scoring_system epss
scoring_elements 0.95848
published_at 2026-04-12T12:55:00Z
7
value 0.22601
scoring_system epss
scoring_elements 0.95849
published_at 2026-04-13T12:55:00Z
8
value 0.22601
scoring_system epss
scoring_elements 0.95861
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0001
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0001
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=554418
reference_id 554418
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=554418
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=566002
reference_id 566002
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=566002
5
reference_url https://security.gentoo.org/glsa/201412-08
reference_id GLSA-201412-08
reference_type
scores
url https://security.gentoo.org/glsa/201412-08
6
reference_url https://access.redhat.com/errata/RHSA-2010:0061
reference_id RHSA-2010:0061
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0061
7
reference_url https://usn.ubuntu.com/889-1/
reference_id USN-889-1
reference_type
scores
url https://usn.ubuntu.com/889-1/
fixed_packages
0
url pkg:deb/debian/gzip@1.3.12-9%2Bsqueeze1
purl pkg:deb/debian/gzip@1.3.12-9%2Bsqueeze1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3adf-qttu-3kfd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.12-9%252Bsqueeze1
aliases CVE-2010-0001
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vm8g-v83d-mbfm
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.12-6%252Blenny1