Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/gzip@1.3.3-16?arch=rhel4
Typerpm
Namespaceredhat
Namegzip
Version1.3.3-16
Qualifiers
arch rhel4
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-73ee-qa4t-gqd7
vulnerability_id VCID-73ee-qa4t-gqd7
summary
gzip is affected by multiple vulnerabilities, including buffer overflows
    and infinite loops, possibly allowing the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4334.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4334.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4334
reference_id
reference_type
scores
0
value 0.09059
scoring_system epss
scoring_elements 0.92644
published_at 2026-04-13T12:55:00Z
1
value 0.09059
scoring_system epss
scoring_elements 0.92657
published_at 2026-04-16T12:55:00Z
2
value 0.10427
scoring_system epss
scoring_elements 0.93209
published_at 2026-04-04T12:55:00Z
3
value 0.10427
scoring_system epss
scoring_elements 0.93206
published_at 2026-04-07T12:55:00Z
4
value 0.10427
scoring_system epss
scoring_elements 0.93196
published_at 2026-04-01T12:55:00Z
5
value 0.10427
scoring_system epss
scoring_elements 0.93219
published_at 2026-04-09T12:55:00Z
6
value 0.10427
scoring_system epss
scoring_elements 0.93223
published_at 2026-04-11T12:55:00Z
7
value 0.10427
scoring_system epss
scoring_elements 0.93215
published_at 2026-04-08T12:55:00Z
8
value 0.10427
scoring_system epss
scoring_elements 0.93205
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4334
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4334
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4334
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618181
reference_id 1618181
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618181
4
reference_url https://security.gentoo.org/glsa/200609-13
reference_id GLSA-200609-13
reference_type
scores
url https://security.gentoo.org/glsa/200609-13
5
reference_url https://access.redhat.com/errata/RHSA-2006:0667
reference_id RHSA-2006:0667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0667
6
reference_url https://usn.ubuntu.com/349-1/
reference_id USN-349-1
reference_type
scores
url https://usn.ubuntu.com/349-1/
fixed_packages
aliases CVE-2006-4334
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-73ee-qa4t-gqd7
1
url VCID-ensg-v8ut-4kh9
vulnerability_id VCID-ensg-v8ut-4kh9
summary
gzip is affected by multiple vulnerabilities, including buffer overflows
    and infinite loops, possibly allowing the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4337.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4337.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4337
reference_id
reference_type
scores
0
value 0.02365
scoring_system epss
scoring_elements 0.84868
published_at 2026-04-01T12:55:00Z
1
value 0.02365
scoring_system epss
scoring_elements 0.84883
published_at 2026-04-02T12:55:00Z
2
value 0.02365
scoring_system epss
scoring_elements 0.84901
published_at 2026-04-04T12:55:00Z
3
value 0.02365
scoring_system epss
scoring_elements 0.84905
published_at 2026-04-07T12:55:00Z
4
value 0.02365
scoring_system epss
scoring_elements 0.84928
published_at 2026-04-08T12:55:00Z
5
value 0.02365
scoring_system epss
scoring_elements 0.84935
published_at 2026-04-09T12:55:00Z
6
value 0.02365
scoring_system epss
scoring_elements 0.84951
published_at 2026-04-11T12:55:00Z
7
value 0.10293
scoring_system epss
scoring_elements 0.9317
published_at 2026-04-12T12:55:00Z
8
value 0.10293
scoring_system epss
scoring_elements 0.93172
published_at 2026-04-13T12:55:00Z
9
value 0.10293
scoring_system epss
scoring_elements 0.93188
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4337
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4337
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4337
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=220595
reference_id 220595
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=220595
4
reference_url https://security.gentoo.org/glsa/200609-13
reference_id GLSA-200609-13
reference_type
scores
url https://security.gentoo.org/glsa/200609-13
5
reference_url https://security.gentoo.org/glsa/200611-24
reference_id GLSA-200611-24
reference_type
scores
url https://security.gentoo.org/glsa/200611-24
6
reference_url https://access.redhat.com/errata/RHSA-2006:0667
reference_id RHSA-2006:0667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0667
7
reference_url https://usn.ubuntu.com/349-1/
reference_id USN-349-1
reference_type
scores
url https://usn.ubuntu.com/349-1/
fixed_packages
aliases CVE-2006-4337
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ensg-v8ut-4kh9
2
url VCID-px24-9c2r-73cn
vulnerability_id VCID-px24-9c2r-73cn
summary
gzip is affected by multiple vulnerabilities, including buffer overflows
    and infinite loops, possibly allowing the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4338.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4338.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4338
reference_id
reference_type
scores
0
value 0.03744
scoring_system epss
scoring_elements 0.87957
published_at 2026-04-01T12:55:00Z
1
value 0.03744
scoring_system epss
scoring_elements 0.87968
published_at 2026-04-02T12:55:00Z
2
value 0.03744
scoring_system epss
scoring_elements 0.87982
published_at 2026-04-04T12:55:00Z
3
value 0.03744
scoring_system epss
scoring_elements 0.87986
published_at 2026-04-07T12:55:00Z
4
value 0.03744
scoring_system epss
scoring_elements 0.88006
published_at 2026-04-08T12:55:00Z
5
value 0.03744
scoring_system epss
scoring_elements 0.88013
published_at 2026-04-09T12:55:00Z
6
value 0.03744
scoring_system epss
scoring_elements 0.88023
published_at 2026-04-11T12:55:00Z
7
value 0.04679
scoring_system epss
scoring_elements 0.89339
published_at 2026-04-12T12:55:00Z
8
value 0.04679
scoring_system epss
scoring_elements 0.89336
published_at 2026-04-13T12:55:00Z
9
value 0.04679
scoring_system epss
scoring_elements 0.8935
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4338
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4338
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618182
reference_id 1618182
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618182
4
reference_url https://security.gentoo.org/glsa/200609-13
reference_id GLSA-200609-13
reference_type
scores
url https://security.gentoo.org/glsa/200609-13
5
reference_url https://security.gentoo.org/glsa/200611-24
reference_id GLSA-200611-24
reference_type
scores
url https://security.gentoo.org/glsa/200611-24
6
reference_url https://access.redhat.com/errata/RHSA-2006:0667
reference_id RHSA-2006:0667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0667
7
reference_url https://usn.ubuntu.com/349-1/
reference_id USN-349-1
reference_type
scores
url https://usn.ubuntu.com/349-1/
fixed_packages
aliases CVE-2006-4338
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-px24-9c2r-73cn
3
url VCID-z31n-qyzz-rfhy
vulnerability_id VCID-z31n-qyzz-rfhy
summary
gzip is affected by multiple vulnerabilities, including buffer overflows
    and infinite loops, possibly allowing the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4336.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4336.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4336
reference_id
reference_type
scores
0
value 0.02573
scoring_system epss
scoring_elements 0.85478
published_at 2026-04-01T12:55:00Z
1
value 0.02573
scoring_system epss
scoring_elements 0.8549
published_at 2026-04-02T12:55:00Z
2
value 0.02573
scoring_system epss
scoring_elements 0.85507
published_at 2026-04-04T12:55:00Z
3
value 0.02573
scoring_system epss
scoring_elements 0.85511
published_at 2026-04-07T12:55:00Z
4
value 0.02573
scoring_system epss
scoring_elements 0.85531
published_at 2026-04-08T12:55:00Z
5
value 0.02573
scoring_system epss
scoring_elements 0.8554
published_at 2026-04-09T12:55:00Z
6
value 0.02573
scoring_system epss
scoring_elements 0.85554
published_at 2026-04-11T12:55:00Z
7
value 0.13836
scoring_system epss
scoring_elements 0.94291
published_at 2026-04-12T12:55:00Z
8
value 0.13836
scoring_system epss
scoring_elements 0.94292
published_at 2026-04-13T12:55:00Z
9
value 0.13836
scoring_system epss
scoring_elements 0.94307
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4336
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4336
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4336
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=220595
reference_id 220595
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=220595
4
reference_url https://security.gentoo.org/glsa/200609-13
reference_id GLSA-200609-13
reference_type
scores
url https://security.gentoo.org/glsa/200609-13
5
reference_url https://security.gentoo.org/glsa/200611-24
reference_id GLSA-200611-24
reference_type
scores
url https://security.gentoo.org/glsa/200611-24
6
reference_url https://access.redhat.com/errata/RHSA-2006:0667
reference_id RHSA-2006:0667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0667
7
reference_url https://usn.ubuntu.com/349-1/
reference_id USN-349-1
reference_type
scores
url https://usn.ubuntu.com/349-1/
fixed_packages
aliases CVE-2006-4336
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z31n-qyzz-rfhy
4
url VCID-z6cd-db4j-2uey
vulnerability_id VCID-z6cd-db4j-2uey
summary
gzip is affected by multiple vulnerabilities, including buffer overflows
    and infinite loops, possibly allowing the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4335.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4335.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4335
reference_id
reference_type
scores
0
value 0.009
scoring_system epss
scoring_elements 0.7561
published_at 2026-04-01T12:55:00Z
1
value 0.009
scoring_system epss
scoring_elements 0.75612
published_at 2026-04-02T12:55:00Z
2
value 0.009
scoring_system epss
scoring_elements 0.75643
published_at 2026-04-04T12:55:00Z
3
value 0.009
scoring_system epss
scoring_elements 0.75622
published_at 2026-04-07T12:55:00Z
4
value 0.009
scoring_system epss
scoring_elements 0.75656
published_at 2026-04-08T12:55:00Z
5
value 0.009
scoring_system epss
scoring_elements 0.75668
published_at 2026-04-09T12:55:00Z
6
value 0.009
scoring_system epss
scoring_elements 0.75692
published_at 2026-04-11T12:55:00Z
7
value 0.03561
scoring_system epss
scoring_elements 0.87708
published_at 2026-04-12T12:55:00Z
8
value 0.03561
scoring_system epss
scoring_elements 0.87706
published_at 2026-04-13T12:55:00Z
9
value 0.03561
scoring_system epss
scoring_elements 0.87721
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4335
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4335
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4335
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=220595
reference_id 220595
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=220595
4
reference_url https://security.gentoo.org/glsa/200609-13
reference_id GLSA-200609-13
reference_type
scores
url https://security.gentoo.org/glsa/200609-13
5
reference_url https://security.gentoo.org/glsa/200611-24
reference_id GLSA-200611-24
reference_type
scores
url https://security.gentoo.org/glsa/200611-24
6
reference_url https://access.redhat.com/errata/RHSA-2006:0667
reference_id RHSA-2006:0667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0667
7
reference_url https://usn.ubuntu.com/349-1/
reference_id USN-349-1
reference_type
scores
url https://usn.ubuntu.com/349-1/
fixed_packages
aliases CVE-2006-4335
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z6cd-db4j-2uey
Fixing_vulnerabilities
Risk_score0.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/gzip@1.3.3-16%3Farch=rhel4