Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/bzip2@1.0.6-4
Typedeb
Namespacedebian
Namebzip2
Version1.0.6-4
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.0.6-9.2~deb10u1
Latest_non_vulnerable_version1.0.6-9.2~deb10u1
Affected_by_vulnerabilities
0
url VCID-n51n-m2r7-kbdy
vulnerability_id VCID-n51n-m2r7-kbdy
summary bzip2: bzip2: Data integrity error when decompressing (with data integrity tests fail).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12900.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12900.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-12900
reference_id
reference_type
scores
0
value 0.01111
scoring_system epss
scoring_elements 0.78111
published_at 2026-04-07T12:55:00Z
1
value 0.01111
scoring_system epss
scoring_elements 0.78174
published_at 2026-04-21T12:55:00Z
2
value 0.01111
scoring_system epss
scoring_elements 0.78179
published_at 2026-04-18T12:55:00Z
3
value 0.01111
scoring_system epss
scoring_elements 0.7818
published_at 2026-04-16T12:55:00Z
4
value 0.01111
scoring_system epss
scoring_elements 0.78146
published_at 2026-04-13T12:55:00Z
5
value 0.01111
scoring_system epss
scoring_elements 0.7815
published_at 2026-04-12T12:55:00Z
6
value 0.01111
scoring_system epss
scoring_elements 0.78168
published_at 2026-04-11T12:55:00Z
7
value 0.01111
scoring_system epss
scoring_elements 0.78143
published_at 2026-04-09T12:55:00Z
8
value 0.01111
scoring_system epss
scoring_elements 0.78129
published_at 2026-04-04T12:55:00Z
9
value 0.01111
scoring_system epss
scoring_elements 0.78137
published_at 2026-04-08T12:55:00Z
10
value 0.01132
scoring_system epss
scoring_elements 0.78283
published_at 2026-04-01T12:55:00Z
11
value 0.01132
scoring_system epss
scoring_elements 0.7829
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-12900
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2332075
reference_id 2332075
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2332075
5
reference_url https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc
reference_id 74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930886
reference_id 930886
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930886
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934359
reference_id 934359
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934359
8
reference_url https://support.f5.com/csp/article/K68713584?utm_source=f5support&amp%3Butm_medium=RSS
reference_id K68713584?utm_source=f5support&amp%3Butm_medium=RSS
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://support.f5.com/csp/article/K68713584?utm_source=f5support&amp%3Butm_medium=RSS
9
reference_url https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html
reference_id msg00012.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html
10
reference_url https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html
11
reference_url https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html
reference_id msg00018.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html
12
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html
reference_id msg00040.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html
13
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html
reference_id msg00050.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html
14
reference_url https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774%40%3Cuser.flink.apache.org%3E
reference_id rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774%40%3Cuser.flink.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774%40%3Cuser.flink.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4%40%3Cuser.flink.apache.org%3E
reference_id rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4%40%3Cuser.flink.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4%40%3Cuser.flink.apache.org%3E
16
reference_url https://access.redhat.com/errata/RHSA-2024:10803
reference_id RHSA-2024:10803
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10803
17
reference_url https://access.redhat.com/errata/RHSA-2024:8922
reference_id RHSA-2024:8922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8922
18
reference_url https://access.redhat.com/errata/RHSA-2025:0733
reference_id RHSA-2025:0733
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0733
19
reference_url https://access.redhat.com/errata/RHSA-2025:0925
reference_id RHSA-2025:0925
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0925
20
reference_url https://access.redhat.com/errata/RHSA-2025:1154
reference_id RHSA-2025:1154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1154
21
reference_url https://usn.ubuntu.com/4038-1/
reference_id USN-4038-1
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://usn.ubuntu.com/4038-1/
22
reference_url https://usn.ubuntu.com/4038-2/
reference_id USN-4038-2
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://usn.ubuntu.com/4038-2/
23
reference_url https://usn.ubuntu.com/4146-1/
reference_id USN-4146-1
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://usn.ubuntu.com/4146-1/
24
reference_url https://usn.ubuntu.com/4146-2/
reference_id USN-4146-2
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://usn.ubuntu.com/4146-2/
fixed_packages
0
url pkg:deb/debian/bzip2@1.0.6-9.2~deb10u1
purl pkg:deb/debian/bzip2@1.0.6-9.2~deb10u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.6-9.2~deb10u1
aliases CVE-2019-12900
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n51n-m2r7-kbdy
1
url VCID-rgbz-6485-tfan
vulnerability_id VCID-rgbz-6485-tfan
summary
An use-after-free vulnerability has been found in bzip2 that could
    allow remote attackers to cause a Denial of Service condition.
references
0
reference_url http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html
1
reference_url http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3189.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3189.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3189
reference_id
reference_type
scores
0
value 0.23714
scoring_system epss
scoring_elements 0.96008
published_at 2026-04-16T12:55:00Z
1
value 0.23714
scoring_system epss
scoring_elements 0.95999
published_at 2026-04-13T12:55:00Z
2
value 0.23714
scoring_system epss
scoring_elements 0.95996
published_at 2026-04-12T12:55:00Z
3
value 0.23714
scoring_system epss
scoring_elements 0.95993
published_at 2026-04-09T12:55:00Z
4
value 0.23714
scoring_system epss
scoring_elements 0.95991
published_at 2026-04-08T12:55:00Z
5
value 0.23714
scoring_system epss
scoring_elements 0.95982
published_at 2026-04-07T12:55:00Z
6
value 0.23714
scoring_system epss
scoring_elements 0.95977
published_at 2026-04-04T12:55:00Z
7
value 0.23714
scoring_system epss
scoring_elements 0.95971
published_at 2026-04-02T12:55:00Z
8
value 0.23714
scoring_system epss
scoring_elements 0.96015
published_at 2026-04-21T12:55:00Z
9
value 0.23714
scoring_system epss
scoring_elements 0.96014
published_at 2026-04-18T12:55:00Z
10
value 0.23714
scoring_system epss
scoring_elements 0.95963
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3189
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3189
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.apache.org/thread.html/r19b4a70ac52093115fd71d773a7a4f579599e6275a13cfcf6252c3e3%40%3Cjira.kafka.apache.org%3E
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://lists.apache.org/thread.html/r19b4a70ac52093115fd71d773a7a4f579599e6275a13cfcf6252c3e3%40%3Cjira.kafka.apache.org%3E
7
reference_url https://lists.apache.org/thread.html/r1dc4c9b3bd559301bdb1557245f78b8910146efb1ee534b774c5f6af%40%3Cdev.kafka.apache.org%3E
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://lists.apache.org/thread.html/r1dc4c9b3bd559301bdb1557245f78b8910146efb1ee534b774c5f6af%40%3Cdev.kafka.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/r481cda41fefb03e04c51484ed14421d812e5ce9e0972edff10f37260%40%3Cjira.kafka.apache.org%3E
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://lists.apache.org/thread.html/r481cda41fefb03e04c51484ed14421d812e5ce9e0972edff10f37260%40%3Cjira.kafka.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/r4ad2ea01354e394b7fa8c78a184b7e1634d51be9bc0e9e4d7e6c9305%40%3Cjira.kafka.apache.org%3E
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://lists.apache.org/thread.html/r4ad2ea01354e394b7fa8c78a184b7e1634d51be9bc0e9e4d7e6c9305%40%3Cjira.kafka.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/r5f7ac2bd631ccb12ced65b71ff11f94e76d05b22000795e4a7b61203%40%3Cjira.kafka.apache.org%3E
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://lists.apache.org/thread.html/r5f7ac2bd631ccb12ced65b71ff11f94e76d05b22000795e4a7b61203%40%3Cjira.kafka.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/r5f80cf3ade5bb73410643e885fe6b7bf9f0222daf3533e42c7ae240c%40%3Cjira.kafka.apache.org%3E
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://lists.apache.org/thread.html/r5f80cf3ade5bb73410643e885fe6b7bf9f0222daf3533e42c7ae240c%40%3Cjira.kafka.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/r6e3962fc9f6a79851f70cffdec5759065969cec9c6708b964464b301%40%3Cjira.kafka.apache.org%3E
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://lists.apache.org/thread.html/r6e3962fc9f6a79851f70cffdec5759065969cec9c6708b964464b301%40%3Cjira.kafka.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b%40%3Cusers.kafka.apache.org%3E
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b%40%3Cusers.kafka.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/redf17d8ad16140733b25ca402ae825d6dfa9b85f73d9fb3fd0c75d73%40%3Cdev.kafka.apache.org%3E
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://lists.apache.org/thread.html/redf17d8ad16140733b25ca402ae825d6dfa9b85f73d9fb3fd0c75d73%40%3Cdev.kafka.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/rffebcbeaace56ff1fed7916700d2f414ca1366386fb1293e99b3e31e%40%3Cjira.kafka.apache.org%3E
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://lists.apache.org/thread.html/rffebcbeaace56ff1fed7916700d2f414ca1366386fb1293e99b3e31e%40%3Cjira.kafka.apache.org%3E
16
reference_url https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html
17
reference_url https://seclists.org/bugtraq/2019/Aug/4
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://seclists.org/bugtraq/2019/Aug/4
18
reference_url https://seclists.org/bugtraq/2019/Jul/22
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://seclists.org/bugtraq/2019/Jul/22
19
reference_url https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc
20
reference_url https://www.oracle.com/security-alerts/cpuoct2020.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://www.oracle.com/security-alerts/cpuoct2020.html
21
reference_url http://www.openwall.com/lists/oss-security/2016/06/20/1
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url http://www.openwall.com/lists/oss-security/2016/06/20/1
22
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
23
reference_url http://www.securityfocus.com/bid/91297
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url http://www.securityfocus.com/bid/91297
24
reference_url http://www.securitytracker.com/id/1036132
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url http://www.securitytracker.com/id/1036132
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1319648
reference_id 1319648
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=1319648
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827744
reference_id 827744
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827744
27
reference_url https://security.archlinux.org/ASA-201702-19
reference_id ASA-201702-19
reference_type
scores
url https://security.archlinux.org/ASA-201702-19
28
reference_url https://security.archlinux.org/AVG-4
reference_id AVG-4
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-4
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.6:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3189
reference_id CVE-2016-3189
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3189
32
reference_url https://security.gentoo.org/glsa/201708-08
reference_id GLSA-201708-08
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://security.gentoo.org/glsa/201708-08
33
reference_url https://usn.ubuntu.com/4038-1/
reference_id USN-4038-1
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://usn.ubuntu.com/4038-1/
34
reference_url https://usn.ubuntu.com/4038-2/
reference_id USN-4038-2
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://usn.ubuntu.com/4038-2/
fixed_packages
0
url pkg:deb/debian/bzip2@1.0.6-8.1
purl pkg:deb/debian/bzip2@1.0.6-8.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-n51n-m2r7-kbdy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.6-8.1
aliases CVE-2016-3189
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rgbz-6485-tfan
Fixing_vulnerabilities
0
url VCID-569v-spq6-dbhv
vulnerability_id VCID-569v-spq6-dbhv
summary The bzexe command in bzip2 1.0.5 and earlier generates compressed executables that do not properly handle temporary files during extraction, which allows local users to execute arbitrary code by precreating a temporary directory.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4089.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4089.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4089
reference_id
reference_type
scores
0
value 0.00152
scoring_system epss
scoring_elements 0.35722
published_at 2026-04-01T12:55:00Z
1
value 0.00152
scoring_system epss
scoring_elements 0.3592
published_at 2026-04-02T12:55:00Z
2
value 0.00152
scoring_system epss
scoring_elements 0.3595
published_at 2026-04-04T12:55:00Z
3
value 0.00152
scoring_system epss
scoring_elements 0.35781
published_at 2026-04-07T12:55:00Z
4
value 0.00152
scoring_system epss
scoring_elements 0.35831
published_at 2026-04-08T12:55:00Z
5
value 0.00152
scoring_system epss
scoring_elements 0.35854
published_at 2026-04-09T12:55:00Z
6
value 0.00152
scoring_system epss
scoring_elements 0.35861
published_at 2026-04-11T12:55:00Z
7
value 0.00152
scoring_system epss
scoring_elements 0.3582
published_at 2026-04-12T12:55:00Z
8
value 0.00152
scoring_system epss
scoring_elements 0.35797
published_at 2026-04-13T12:55:00Z
9
value 0.00152
scoring_system epss
scoring_elements 0.35836
published_at 2026-04-16T12:55:00Z
10
value 0.00152
scoring_system epss
scoring_elements 0.35824
published_at 2026-04-18T12:55:00Z
11
value 0.00152
scoring_system epss
scoring_elements 0.35775
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4089
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4089
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=632862
reference_id 632862
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=632862
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/18147.c
reference_id CVE-2011-4089;OSVDB-77356
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/18147.c
5
reference_url https://usn.ubuntu.com/1308-1/
reference_id USN-1308-1
reference_type
scores
url https://usn.ubuntu.com/1308-1/
fixed_packages
0
url pkg:deb/debian/bzip2@1.0.6-4
purl pkg:deb/debian/bzip2@1.0.6-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-n51n-m2r7-kbdy
1
vulnerability VCID-rgbz-6485-tfan
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.6-4
aliases CVE-2011-4089
risk_score null
exploitability 2.0
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-569v-spq6-dbhv
Risk_score4.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.6-4