Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/bzip2@1.0.8-4?distro=trixie
Typedeb
Namespacedebian
Namebzip2
Version1.0.8-4
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.0.8-5
Latest_non_vulnerable_version1.0.8-6
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-569v-spq6-dbhv
vulnerability_id VCID-569v-spq6-dbhv
summary The bzexe command in bzip2 1.0.5 and earlier generates compressed executables that do not properly handle temporary files during extraction, which allows local users to execute arbitrary code by precreating a temporary directory.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4089.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4089.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4089
reference_id
reference_type
scores
0
value 0.00152
scoring_system epss
scoring_elements 0.35722
published_at 2026-04-01T12:55:00Z
1
value 0.00152
scoring_system epss
scoring_elements 0.3592
published_at 2026-04-02T12:55:00Z
2
value 0.00152
scoring_system epss
scoring_elements 0.3595
published_at 2026-04-04T12:55:00Z
3
value 0.00152
scoring_system epss
scoring_elements 0.35781
published_at 2026-04-07T12:55:00Z
4
value 0.00152
scoring_system epss
scoring_elements 0.35831
published_at 2026-04-08T12:55:00Z
5
value 0.00152
scoring_system epss
scoring_elements 0.35854
published_at 2026-04-09T12:55:00Z
6
value 0.00152
scoring_system epss
scoring_elements 0.35861
published_at 2026-04-11T12:55:00Z
7
value 0.00152
scoring_system epss
scoring_elements 0.3582
published_at 2026-04-12T12:55:00Z
8
value 0.00152
scoring_system epss
scoring_elements 0.35797
published_at 2026-04-13T12:55:00Z
9
value 0.00152
scoring_system epss
scoring_elements 0.35836
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4089
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4089
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4089
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=632862
reference_id 632862
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=632862
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/18147.c
reference_id CVE-2011-4089;OSVDB-77356
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/18147.c
5
reference_url https://usn.ubuntu.com/1308-1/
reference_id USN-1308-1
reference_type
scores
url https://usn.ubuntu.com/1308-1/
fixed_packages
0
url pkg:deb/debian/bzip2@1.0.6-1?distro=trixie
purl pkg:deb/debian/bzip2@1.0.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.6-1%3Fdistro=trixie
1
url pkg:deb/debian/bzip2@1.0.8-4?distro=trixie
purl pkg:deb/debian/bzip2@1.0.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-4%3Fdistro=trixie
2
url pkg:deb/debian/bzip2@1.0.8-5?distro=trixie
purl pkg:deb/debian/bzip2@1.0.8-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-5%3Fdistro=trixie
3
url pkg:deb/debian/bzip2@1.0.8-6?distro=trixie
purl pkg:deb/debian/bzip2@1.0.8-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-6%3Fdistro=trixie
aliases CVE-2011-4089
risk_score null
exploitability 2.0
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-569v-spq6-dbhv
1
url VCID-6u8f-799b-sff1
vulnerability_id VCID-6u8f-799b-sff1
summary security flaw
references
0
reference_url ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-004.txt.asc
reference_id
reference_type
scores
url ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-004.txt.asc
1
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc
2
reference_url http://docs.info.apple.com/article.html?artnum=307041
reference_id
reference_type
scores
url http://docs.info.apple.com/article.html?artnum=307041
3
reference_url http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html
4
reference_url http://marc.info/?l=bugtraq&m=111229375217633&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=111229375217633&w=2
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0953.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0953.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-0953
reference_id
reference_type
scores
0
value 0.00094
scoring_system epss
scoring_elements 0.26185
published_at 2026-04-16T12:55:00Z
1
value 0.00094
scoring_system epss
scoring_elements 0.26308
published_at 2026-04-01T12:55:00Z
2
value 0.00094
scoring_system epss
scoring_elements 0.26349
published_at 2026-04-02T12:55:00Z
3
value 0.00094
scoring_system epss
scoring_elements 0.26389
published_at 2026-04-04T12:55:00Z
4
value 0.00094
scoring_system epss
scoring_elements 0.26162
published_at 2026-04-07T12:55:00Z
5
value 0.00094
scoring_system epss
scoring_elements 0.2623
published_at 2026-04-08T12:55:00Z
6
value 0.00094
scoring_system epss
scoring_elements 0.26278
published_at 2026-04-09T12:55:00Z
7
value 0.00094
scoring_system epss
scoring_elements 0.26285
published_at 2026-04-11T12:55:00Z
8
value 0.00094
scoring_system epss
scoring_elements 0.2624
published_at 2026-04-12T12:55:00Z
9
value 0.00094
scoring_system epss
scoring_elements 0.26181
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-0953
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0953
8
reference_url http://secunia.com/advisories/19183
reference_id
reference_type
scores
url http://secunia.com/advisories/19183
9
reference_url http://secunia.com/advisories/27274
reference_id
reference_type
scores
url http://secunia.com/advisories/27274
10
reference_url http://secunia.com/advisories/27643
reference_id
reference_type
scores
url http://secunia.com/advisories/27643
11
reference_url http://secunia.com/advisories/29940
reference_id
reference_type
scores
url http://secunia.com/advisories/29940
12
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/19926
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/19926
13
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10902
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10902
14
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1154
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1154
15
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-103118-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-103118-1
16
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-66-200191-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-66-200191-1
17
reference_url http://www.debian.org/security/2005/dsa-730
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-730
18
reference_url http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_158801__Updated_bzip2_packages_fix_security_issues.html
reference_id
reference_type
scores
url http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_158801__Updated_bzip2_packages_fix_security_issues.html
19
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:026
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:026
20
reference_url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.002.html
reference_id
reference_type
scores
url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.002.html
21
reference_url http://www.redhat.com/support/errata/RHSA-2005-474.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-474.html
22
reference_url http://www.securityfocus.com/archive/1/456430/30/8730/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/456430/30/8730/threaded
23
reference_url http://www.securityfocus.com/bid/12954
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/12954
24
reference_url http://www.securityfocus.com/bid/26444
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/26444
25
reference_url http://www.us-cert.gov/cas/techalerts/TA07-319A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA07-319A.html
26
reference_url http://www.vupen.com/english/advisories/2007/3525
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3525
27
reference_url http://www.vupen.com/english/advisories/2007/3868
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3868
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617590
reference_id 1617590
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617590
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:0.9.5_a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_a:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:0.9.5_b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_b:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:0.9.5_c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_c:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:0.9.5_d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_d:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9_a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:0.9_a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9_a:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9_b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:0.9_b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9_b:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9_c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:0.9_c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9_c:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.1:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-0953
reference_id CVE-2005-0953
reference_type
scores
0
value 3.7
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-0953
41
reference_url https://access.redhat.com/errata/RHSA-2005:474
reference_id RHSA-2005:474
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:474
42
reference_url https://usn.ubuntu.com/127-1/
reference_id USN-127-1
reference_type
scores
url https://usn.ubuntu.com/127-1/
fixed_packages
0
url pkg:deb/debian/bzip2@1.0.2-6?distro=trixie
purl pkg:deb/debian/bzip2@1.0.2-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.2-6%3Fdistro=trixie
1
url pkg:deb/debian/bzip2@1.0.8-4?distro=trixie
purl pkg:deb/debian/bzip2@1.0.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-4%3Fdistro=trixie
2
url pkg:deb/debian/bzip2@1.0.8-5?distro=trixie
purl pkg:deb/debian/bzip2@1.0.8-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-5%3Fdistro=trixie
3
url pkg:deb/debian/bzip2@1.0.8-6?distro=trixie
purl pkg:deb/debian/bzip2@1.0.8-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-6%3Fdistro=trixie
aliases CVE-2005-0953
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6u8f-799b-sff1
2
url VCID-azhe-cxb8-3kbb
vulnerability_id VCID-azhe-cxb8-3kbb
summary
Multiple vulnerabilities were found in Clam AntiVirus, the most
    severe of which may allow the execution of arbitrary code.
references
0
reference_url http://blogs.sun.com/security/entry/cve_2010_0405_integer_overflow
reference_id
reference_type
scores
url http://blogs.sun.com/security/entry/cve_2010_0405_integer_overflow
1
reference_url http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob_plain%3Bf=ChangeLog%3Bhb=clamav-0.96.3
reference_id
reference_type
scores
url http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob_plain%3Bf=ChangeLog%3Bhb=clamav-0.96.3
2
reference_url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051278.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051278.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051366.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051366.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html
6
reference_url http://marc.info/?l=oss-security&m=128506868510655&w=2
reference_id
reference_type
scores
url http://marc.info/?l=oss-security&m=128506868510655&w=2
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0405.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0405.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0405
reference_id
reference_type
scores
0
value 0.07688
scoring_system epss
scoring_elements 0.91929
published_at 2026-04-16T12:55:00Z
1
value 0.07688
scoring_system epss
scoring_elements 0.91871
published_at 2026-04-01T12:55:00Z
2
value 0.07688
scoring_system epss
scoring_elements 0.91879
published_at 2026-04-02T12:55:00Z
3
value 0.07688
scoring_system epss
scoring_elements 0.91886
published_at 2026-04-04T12:55:00Z
4
value 0.07688
scoring_system epss
scoring_elements 0.91893
published_at 2026-04-07T12:55:00Z
5
value 0.07688
scoring_system epss
scoring_elements 0.91905
published_at 2026-04-08T12:55:00Z
6
value 0.07688
scoring_system epss
scoring_elements 0.91911
published_at 2026-04-09T12:55:00Z
7
value 0.07688
scoring_system epss
scoring_elements 0.91914
published_at 2026-04-12T12:55:00Z
8
value 0.07688
scoring_system epss
scoring_elements 0.9191
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0405
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0405
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0405
10
reference_url http://secunia.com/advisories/41452
reference_id
reference_type
scores
url http://secunia.com/advisories/41452
11
reference_url http://secunia.com/advisories/41505
reference_id
reference_type
scores
url http://secunia.com/advisories/41505
12
reference_url http://secunia.com/advisories/42350
reference_id
reference_type
scores
url http://secunia.com/advisories/42350
13
reference_url http://secunia.com/advisories/42404
reference_id
reference_type
scores
url http://secunia.com/advisories/42404
14
reference_url http://secunia.com/advisories/42405
reference_id
reference_type
scores
url http://secunia.com/advisories/42405
15
reference_url http://secunia.com/advisories/42529
reference_id
reference_type
scores
url http://secunia.com/advisories/42529
16
reference_url http://secunia.com/advisories/42530
reference_id
reference_type
scores
url http://secunia.com/advisories/42530
17
reference_url http://secunia.com/advisories/48378
reference_id
reference_type
scores
url http://secunia.com/advisories/48378
18
reference_url http://security.gentoo.org/glsa/glsa-201301-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201301-05.xml
19
reference_url http://support.apple.com/kb/HT4581
reference_id
reference_type
scores
url http://support.apple.com/kb/HT4581
20
reference_url https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2230
reference_id
reference_type
scores
url https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2230
21
reference_url https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2231
reference_id
reference_type
scores
url https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2231
22
reference_url http://www.bzip.org/
reference_id
reference_type
scores
url http://www.bzip.org/
23
reference_url http://www.redhat.com/support/errata/RHSA-2010-0703.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0703.html
24
reference_url http://www.redhat.com/support/errata/RHSA-2010-0858.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2010-0858.html
25
reference_url http://www.securityfocus.com/archive/1/515055/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/515055/100/0/threaded
26
reference_url http://www.ubuntu.com/usn/usn-986-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-986-1
27
reference_url http://www.ubuntu.com/usn/USN-986-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-986-2
28
reference_url http://www.ubuntu.com/usn/USN-986-3
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-986-3
29
reference_url http://www.vmware.com/security/advisories/VMSA-2010-0019.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2010-0019.html
30
reference_url http://www.vupen.com/english/advisories/2010/2455
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/2455
31
reference_url http://www.vupen.com/english/advisories/2010/3043
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3043
32
reference_url http://www.vupen.com/english/advisories/2010/3052
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3052
33
reference_url http://www.vupen.com/english/advisories/2010/3073
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3073
34
reference_url http://www.vupen.com/english/advisories/2010/3126
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3126
35
reference_url http://www.vupen.com/english/advisories/2010/3127
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/3127
36
reference_url http://xorl.wordpress.com/2010/09/21/cve-2010-0405-bzip2-integer-overflow/
reference_id
reference_type
scores
url http://xorl.wordpress.com/2010/09/21/cve-2010-0405-bzip2-integer-overflow/
37
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=627882
reference_id 627882
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=627882
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:*:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:0.9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.0a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:0.9.0a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.0a:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.0b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:0.9.0b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.0b:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.0c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:0.9.0c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.0c:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:0.9.5_a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_a:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:0.9.5a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5a:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:0.9.5_b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_b:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:0.9.5b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5b:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:0.9.5_c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_c:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:0.9.5c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5c:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:0.9.5_d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_d:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:0.9.5d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5d:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9_a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:0.9_a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9_a:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9_b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:0.9_b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9_b:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9_c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:0.9_c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9_c:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.1:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.2:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:1.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.3:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:1.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.4:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libzip2:libzip2:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libzip2:libzip2:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libzip2:libzip2:*:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-0405
reference_id CVE-2010-0405
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-0405
62
reference_url https://security.gentoo.org/glsa/201110-20
reference_id GLSA-201110-20
reference_type
scores
url https://security.gentoo.org/glsa/201110-20
63
reference_url https://security.gentoo.org/glsa/201301-05
reference_id GLSA-201301-05
reference_type
scores
url https://security.gentoo.org/glsa/201301-05
64
reference_url https://access.redhat.com/errata/RHSA-2010:0703
reference_id RHSA-2010:0703
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0703
65
reference_url https://access.redhat.com/errata/RHSA-2010:0858
reference_id RHSA-2010:0858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0858
66
reference_url https://usn.ubuntu.com/986-1/
reference_id USN-986-1
reference_type
scores
url https://usn.ubuntu.com/986-1/
67
reference_url https://usn.ubuntu.com/986-2/
reference_id USN-986-2
reference_type
scores
url https://usn.ubuntu.com/986-2/
68
reference_url https://usn.ubuntu.com/986-3/
reference_id USN-986-3
reference_type
scores
url https://usn.ubuntu.com/986-3/
fixed_packages
0
url pkg:deb/debian/bzip2@1.0.5-6?distro=trixie
purl pkg:deb/debian/bzip2@1.0.5-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.5-6%3Fdistro=trixie
1
url pkg:deb/debian/bzip2@1.0.8-4?distro=trixie
purl pkg:deb/debian/bzip2@1.0.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-4%3Fdistro=trixie
2
url pkg:deb/debian/bzip2@1.0.8-5?distro=trixie
purl pkg:deb/debian/bzip2@1.0.8-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-5%3Fdistro=trixie
3
url pkg:deb/debian/bzip2@1.0.8-6?distro=trixie
purl pkg:deb/debian/bzip2@1.0.8-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-6%3Fdistro=trixie
aliases CVE-2010-0405
risk_score 2.3
exploitability 0.5
weighted_severity 4.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-azhe-cxb8-3kbb
3
url VCID-fsmc-8exe-j3f6
vulnerability_id VCID-fsmc-8exe-j3f6
summary security flaw
references
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc
1
reference_url http://docs.info.apple.com/article.html?artnum=307041
reference_id
reference_type
scores
url http://docs.info.apple.com/article.html?artnum=307041
2
reference_url http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1260.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1260.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-1260
reference_id
reference_type
scores
0
value 0.09796
scoring_system epss
scoring_elements 0.92972
published_at 2026-04-16T12:55:00Z
1
value 0.09796
scoring_system epss
scoring_elements 0.92935
published_at 2026-04-01T12:55:00Z
2
value 0.09796
scoring_system epss
scoring_elements 0.92943
published_at 2026-04-02T12:55:00Z
3
value 0.09796
scoring_system epss
scoring_elements 0.92947
published_at 2026-04-07T12:55:00Z
4
value 0.09796
scoring_system epss
scoring_elements 0.92954
published_at 2026-04-08T12:55:00Z
5
value 0.09796
scoring_system epss
scoring_elements 0.92959
published_at 2026-04-09T12:55:00Z
6
value 0.09796
scoring_system epss
scoring_elements 0.92963
published_at 2026-04-11T12:55:00Z
7
value 0.09796
scoring_system epss
scoring_elements 0.92961
published_at 2026-04-12T12:55:00Z
8
value 0.09796
scoring_system epss
scoring_elements 0.92962
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-1260
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1260
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1260
6
reference_url http://secunia.com/advisories/15447
reference_id
reference_type
scores
url http://secunia.com/advisories/15447
7
reference_url http://secunia.com/advisories/19183
reference_id
reference_type
scores
url http://secunia.com/advisories/19183
8
reference_url http://secunia.com/advisories/27274
reference_id
reference_type
scores
url http://secunia.com/advisories/27274
9
reference_url http://secunia.com/advisories/27643
reference_id
reference_type
scores
url http://secunia.com/advisories/27643
10
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10700
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10700
11
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A749
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A749
12
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-103118-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-103118-1
13
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-66-200191-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-66-200191-1
14
reference_url http://www.debian.org/security/2005/dsa-741
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-741
15
reference_url http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_158801__Updated_bzip2_packages_fix_security_issues.html
reference_id
reference_type
scores
url http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_158801__Updated_bzip2_packages_fix_security_issues.html
16
reference_url http://www.redhat.com/support/errata/RHSA-2005-474.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-474.html
17
reference_url http://www.securityfocus.com/bid/13657
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/13657
18
reference_url http://www.securityfocus.com/bid/26444
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/26444
19
reference_url http://www.us-cert.gov/cas/techalerts/TA07-319A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA07-319A.html
20
reference_url http://www.vupen.com/english/advisories/2007/3525
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3525
21
reference_url http://www.vupen.com/english/advisories/2007/3868
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/3868
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617617
reference_id 1617617
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617617
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-1260
reference_id CVE-2005-1260
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-1260
30
reference_url https://access.redhat.com/errata/RHSA-2005:474
reference_id RHSA-2005:474
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:474
31
reference_url https://usn.ubuntu.com/127-1/
reference_id USN-127-1
reference_type
scores
url https://usn.ubuntu.com/127-1/
fixed_packages
0
url pkg:deb/debian/bzip2@1.0.2-7?distro=trixie
purl pkg:deb/debian/bzip2@1.0.2-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.2-7%3Fdistro=trixie
1
url pkg:deb/debian/bzip2@1.0.8-4?distro=trixie
purl pkg:deb/debian/bzip2@1.0.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-4%3Fdistro=trixie
2
url pkg:deb/debian/bzip2@1.0.8-5?distro=trixie
purl pkg:deb/debian/bzip2@1.0.8-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-5%3Fdistro=trixie
3
url pkg:deb/debian/bzip2@1.0.8-6?distro=trixie
purl pkg:deb/debian/bzip2@1.0.8-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-6%3Fdistro=trixie
aliases CVE-2005-1260
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fsmc-8exe-j3f6
4
url VCID-n51n-m2r7-kbdy
vulnerability_id VCID-n51n-m2r7-kbdy
summary bzip2: bzip2: Data integrity error when decompressing (with data integrity tests fail).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12900.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12900.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-12900
reference_id
reference_type
scores
0
value 0.01111
scoring_system epss
scoring_elements 0.7818
published_at 2026-04-16T12:55:00Z
1
value 0.01111
scoring_system epss
scoring_elements 0.78146
published_at 2026-04-13T12:55:00Z
2
value 0.01111
scoring_system epss
scoring_elements 0.7815
published_at 2026-04-12T12:55:00Z
3
value 0.01111
scoring_system epss
scoring_elements 0.78168
published_at 2026-04-11T12:55:00Z
4
value 0.01111
scoring_system epss
scoring_elements 0.78143
published_at 2026-04-09T12:55:00Z
5
value 0.01111
scoring_system epss
scoring_elements 0.78137
published_at 2026-04-08T12:55:00Z
6
value 0.01111
scoring_system epss
scoring_elements 0.78111
published_at 2026-04-07T12:55:00Z
7
value 0.01111
scoring_system epss
scoring_elements 0.78129
published_at 2026-04-04T12:55:00Z
8
value 0.01132
scoring_system epss
scoring_elements 0.78283
published_at 2026-04-01T12:55:00Z
9
value 0.01132
scoring_system epss
scoring_elements 0.7829
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-12900
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2332075
reference_id 2332075
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2332075
5
reference_url https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc
reference_id 74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930886
reference_id 930886
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930886
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934359
reference_id 934359
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934359
8
reference_url https://support.f5.com/csp/article/K68713584?utm_source=f5support&amp%3Butm_medium=RSS
reference_id K68713584?utm_source=f5support&amp%3Butm_medium=RSS
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://support.f5.com/csp/article/K68713584?utm_source=f5support&amp%3Butm_medium=RSS
9
reference_url https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html
reference_id msg00012.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html
10
reference_url https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html
reference_id msg00014.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html
11
reference_url https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html
reference_id msg00018.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html
12
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html
reference_id msg00040.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html
13
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html
reference_id msg00050.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html
14
reference_url https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774%40%3Cuser.flink.apache.org%3E
reference_id rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774%40%3Cuser.flink.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774%40%3Cuser.flink.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4%40%3Cuser.flink.apache.org%3E
reference_id rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4%40%3Cuser.flink.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4%40%3Cuser.flink.apache.org%3E
16
reference_url https://access.redhat.com/errata/RHSA-2024:10803
reference_id RHSA-2024:10803
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10803
17
reference_url https://access.redhat.com/errata/RHSA-2024:8922
reference_id RHSA-2024:8922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8922
18
reference_url https://access.redhat.com/errata/RHSA-2025:0733
reference_id RHSA-2025:0733
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0733
19
reference_url https://access.redhat.com/errata/RHSA-2025:0925
reference_id RHSA-2025:0925
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0925
20
reference_url https://access.redhat.com/errata/RHSA-2025:1154
reference_id RHSA-2025:1154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1154
21
reference_url https://usn.ubuntu.com/4038-1/
reference_id USN-4038-1
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://usn.ubuntu.com/4038-1/
22
reference_url https://usn.ubuntu.com/4038-2/
reference_id USN-4038-2
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://usn.ubuntu.com/4038-2/
23
reference_url https://usn.ubuntu.com/4146-1/
reference_id USN-4146-1
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://usn.ubuntu.com/4146-1/
24
reference_url https://usn.ubuntu.com/4146-2/
reference_id USN-4146-2
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/
url https://usn.ubuntu.com/4146-2/
fixed_packages
0
url pkg:deb/debian/bzip2@1.0.6-9.1?distro=trixie
purl pkg:deb/debian/bzip2@1.0.6-9.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.6-9.1%3Fdistro=trixie
1
url pkg:deb/debian/bzip2@1.0.8-4?distro=trixie
purl pkg:deb/debian/bzip2@1.0.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-4%3Fdistro=trixie
2
url pkg:deb/debian/bzip2@1.0.8-5?distro=trixie
purl pkg:deb/debian/bzip2@1.0.8-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-5%3Fdistro=trixie
3
url pkg:deb/debian/bzip2@1.0.8-6?distro=trixie
purl pkg:deb/debian/bzip2@1.0.8-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-6%3Fdistro=trixie
aliases CVE-2019-12900
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n51n-m2r7-kbdy
5
url VCID-rgbz-6485-tfan
vulnerability_id VCID-rgbz-6485-tfan
summary
An use-after-free vulnerability has been found in bzip2 that could
    allow remote attackers to cause a Denial of Service condition.
references
0
reference_url http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html
1
reference_url http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3189.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3189.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-3189
reference_id
reference_type
scores
0
value 0.23714
scoring_system epss
scoring_elements 0.95996
published_at 2026-04-12T12:55:00Z
1
value 0.23714
scoring_system epss
scoring_elements 0.95993
published_at 2026-04-09T12:55:00Z
2
value 0.23714
scoring_system epss
scoring_elements 0.95991
published_at 2026-04-08T12:55:00Z
3
value 0.23714
scoring_system epss
scoring_elements 0.95977
published_at 2026-04-04T12:55:00Z
4
value 0.23714
scoring_system epss
scoring_elements 0.95971
published_at 2026-04-02T12:55:00Z
5
value 0.23714
scoring_system epss
scoring_elements 0.95982
published_at 2026-04-07T12:55:00Z
6
value 0.23714
scoring_system epss
scoring_elements 0.95963
published_at 2026-04-01T12:55:00Z
7
value 0.23714
scoring_system epss
scoring_elements 0.96008
published_at 2026-04-16T12:55:00Z
8
value 0.23714
scoring_system epss
scoring_elements 0.95999
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-3189
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3189
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://lists.apache.org/thread.html/r19b4a70ac52093115fd71d773a7a4f579599e6275a13cfcf6252c3e3%40%3Cjira.kafka.apache.org%3E
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://lists.apache.org/thread.html/r19b4a70ac52093115fd71d773a7a4f579599e6275a13cfcf6252c3e3%40%3Cjira.kafka.apache.org%3E
7
reference_url https://lists.apache.org/thread.html/r1dc4c9b3bd559301bdb1557245f78b8910146efb1ee534b774c5f6af%40%3Cdev.kafka.apache.org%3E
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://lists.apache.org/thread.html/r1dc4c9b3bd559301bdb1557245f78b8910146efb1ee534b774c5f6af%40%3Cdev.kafka.apache.org%3E
8
reference_url https://lists.apache.org/thread.html/r481cda41fefb03e04c51484ed14421d812e5ce9e0972edff10f37260%40%3Cjira.kafka.apache.org%3E
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://lists.apache.org/thread.html/r481cda41fefb03e04c51484ed14421d812e5ce9e0972edff10f37260%40%3Cjira.kafka.apache.org%3E
9
reference_url https://lists.apache.org/thread.html/r4ad2ea01354e394b7fa8c78a184b7e1634d51be9bc0e9e4d7e6c9305%40%3Cjira.kafka.apache.org%3E
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://lists.apache.org/thread.html/r4ad2ea01354e394b7fa8c78a184b7e1634d51be9bc0e9e4d7e6c9305%40%3Cjira.kafka.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/r5f7ac2bd631ccb12ced65b71ff11f94e76d05b22000795e4a7b61203%40%3Cjira.kafka.apache.org%3E
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://lists.apache.org/thread.html/r5f7ac2bd631ccb12ced65b71ff11f94e76d05b22000795e4a7b61203%40%3Cjira.kafka.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/r5f80cf3ade5bb73410643e885fe6b7bf9f0222daf3533e42c7ae240c%40%3Cjira.kafka.apache.org%3E
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://lists.apache.org/thread.html/r5f80cf3ade5bb73410643e885fe6b7bf9f0222daf3533e42c7ae240c%40%3Cjira.kafka.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/r6e3962fc9f6a79851f70cffdec5759065969cec9c6708b964464b301%40%3Cjira.kafka.apache.org%3E
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://lists.apache.org/thread.html/r6e3962fc9f6a79851f70cffdec5759065969cec9c6708b964464b301%40%3Cjira.kafka.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b%40%3Cusers.kafka.apache.org%3E
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b%40%3Cusers.kafka.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/redf17d8ad16140733b25ca402ae825d6dfa9b85f73d9fb3fd0c75d73%40%3Cdev.kafka.apache.org%3E
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://lists.apache.org/thread.html/redf17d8ad16140733b25ca402ae825d6dfa9b85f73d9fb3fd0c75d73%40%3Cdev.kafka.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/rffebcbeaace56ff1fed7916700d2f414ca1366386fb1293e99b3e31e%40%3Cjira.kafka.apache.org%3E
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://lists.apache.org/thread.html/rffebcbeaace56ff1fed7916700d2f414ca1366386fb1293e99b3e31e%40%3Cjira.kafka.apache.org%3E
16
reference_url https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html
17
reference_url https://seclists.org/bugtraq/2019/Aug/4
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://seclists.org/bugtraq/2019/Aug/4
18
reference_url https://seclists.org/bugtraq/2019/Jul/22
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://seclists.org/bugtraq/2019/Jul/22
19
reference_url https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc
20
reference_url https://www.oracle.com/security-alerts/cpuoct2020.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://www.oracle.com/security-alerts/cpuoct2020.html
21
reference_url http://www.openwall.com/lists/oss-security/2016/06/20/1
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url http://www.openwall.com/lists/oss-security/2016/06/20/1
22
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
23
reference_url http://www.securityfocus.com/bid/91297
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url http://www.securityfocus.com/bid/91297
24
reference_url http://www.securitytracker.com/id/1036132
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url http://www.securitytracker.com/id/1036132
25
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1319648
reference_id 1319648
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=1319648
26
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827744
reference_id 827744
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827744
27
reference_url https://security.archlinux.org/ASA-201702-19
reference_id ASA-201702-19
reference_type
scores
url https://security.archlinux.org/ASA-201702-19
28
reference_url https://security.archlinux.org/AVG-4
reference_id AVG-4
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-4
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:bzip:bzip2:1.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.6:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:*:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-3189
reference_id CVE-2016-3189
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-3189
32
reference_url https://security.gentoo.org/glsa/201708-08
reference_id GLSA-201708-08
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://security.gentoo.org/glsa/201708-08
33
reference_url https://usn.ubuntu.com/4038-1/
reference_id USN-4038-1
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://usn.ubuntu.com/4038-1/
34
reference_url https://usn.ubuntu.com/4038-2/
reference_id USN-4038-2
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/
url https://usn.ubuntu.com/4038-2/
fixed_packages
0
url pkg:deb/debian/bzip2@1.0.6-8.1?distro=trixie
purl pkg:deb/debian/bzip2@1.0.6-8.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.6-8.1%3Fdistro=trixie
1
url pkg:deb/debian/bzip2@1.0.8-4?distro=trixie
purl pkg:deb/debian/bzip2@1.0.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-4%3Fdistro=trixie
2
url pkg:deb/debian/bzip2@1.0.8-5?distro=trixie
purl pkg:deb/debian/bzip2@1.0.8-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-5%3Fdistro=trixie
3
url pkg:deb/debian/bzip2@1.0.8-6?distro=trixie
purl pkg:deb/debian/bzip2@1.0.8-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-6%3Fdistro=trixie
aliases CVE-2016-3189
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rgbz-6485-tfan
6
url VCID-uf6e-fsw6-bbbv
vulnerability_id VCID-uf6e-fsw6-bbbv
summary security flaw
references
0
reference_url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt
1
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc
2
reference_url http://bugs.gentoo.org/show_bug.cgi?id=90626
reference_id
reference_type
scores
url http://bugs.gentoo.org/show_bug.cgi?id=90626
3
reference_url http://docs.info.apple.com/article.html?artnum=306172
reference_id
reference_type
scores
url http://docs.info.apple.com/article.html?artnum=306172
4
reference_url http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2005-357.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2005-357.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0758.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0758.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-0758
reference_id
reference_type
scores
0
value 0.0015
scoring_system epss
scoring_elements 0.3539
published_at 2026-04-01T12:55:00Z
1
value 0.0015
scoring_system epss
scoring_elements 0.3559
published_at 2026-04-02T12:55:00Z
2
value 0.0015
scoring_system epss
scoring_elements 0.35615
published_at 2026-04-04T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.40416
published_at 2026-04-09T12:55:00Z
4
value 0.00186
scoring_system epss
scoring_elements 0.40437
published_at 2026-04-11T12:55:00Z
5
value 0.00186
scoring_system epss
scoring_elements 0.40399
published_at 2026-04-12T12:55:00Z
6
value 0.00186
scoring_system epss
scoring_elements 0.4038
published_at 2026-04-13T12:55:00Z
7
value 0.00186
scoring_system epss
scoring_elements 0.40427
published_at 2026-04-16T12:55:00Z
8
value 0.00186
scoring_system epss
scoring_elements 0.40354
published_at 2026-04-07T12:55:00Z
9
value 0.00186
scoring_system epss
scoring_elements 0.40405
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-0758
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0758
9
reference_url http://secunia.com/advisories/18100
reference_id
reference_type
scores
url http://secunia.com/advisories/18100
10
reference_url http://secunia.com/advisories/19183
reference_id
reference_type
scores
url http://secunia.com/advisories/19183
11
reference_url http://secunia.com/advisories/22033
reference_id
reference_type
scores
url http://secunia.com/advisories/22033
12
reference_url http://secunia.com/advisories/26235
reference_id
reference_type
scores
url http://secunia.com/advisories/26235
13
reference_url http://securitytracker.com/id?1013928
reference_id
reference_type
scores
url http://securitytracker.com/id?1013928
14
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/20539
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/20539
15
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852
16
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1081
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1081
17
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1107
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1107
18
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9797
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9797
19
reference_url http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_158801__Updated_bzip2_packages_fix_security_issues.html
reference_id
reference_type
scores
url http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_158801__Updated_bzip2_packages_fix_security_issues.html
20
reference_url http://www.gentoo.org/security/en/glsa/glsa-200505-05.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200505-05.xml
21
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:026
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:026
22
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:027
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:027
23
reference_url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.002.html
reference_id
reference_type
scores
url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.002.html
24
reference_url http://www.osvdb.org/16371
reference_id
reference_type
scores
url http://www.osvdb.org/16371
25
reference_url http://www.redhat.com/support/errata/RHSA-2005-474.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-474.html
26
reference_url http://www.securityfocus.com/bid/13582
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/13582
27
reference_url http://www.securityfocus.com/bid/25159
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/25159
28
reference_url http://www.ubuntu.com/usn/usn-158-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-158-1
29
reference_url http://www.vupen.com/english/advisories/2007/2732
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2732
30
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617573
reference_id 1617573
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617573
31
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=321286
reference_id 321286
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=321286
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gzip:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-0758
reference_id CVE-2005-0758
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-0758
36
reference_url https://access.redhat.com/errata/RHSA-2005:357
reference_id RHSA-2005:357
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:357
37
reference_url https://access.redhat.com/errata/RHSA-2005:474
reference_id RHSA-2005:474
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:474
38
reference_url https://usn.ubuntu.com/158-1/
reference_id USN-158-1
reference_type
scores
url https://usn.ubuntu.com/158-1/
39
reference_url https://usn.ubuntu.com/161-1/
reference_id USN-161-1
reference_type
scores
url https://usn.ubuntu.com/161-1/
fixed_packages
0
url pkg:deb/debian/bzip2@1.0.2-8.1?distro=trixie
purl pkg:deb/debian/bzip2@1.0.2-8.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.2-8.1%3Fdistro=trixie
1
url pkg:deb/debian/bzip2@1.0.8-4?distro=trixie
purl pkg:deb/debian/bzip2@1.0.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-4%3Fdistro=trixie
2
url pkg:deb/debian/bzip2@1.0.8-5?distro=trixie
purl pkg:deb/debian/bzip2@1.0.8-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-5%3Fdistro=trixie
3
url pkg:deb/debian/bzip2@1.0.8-6?distro=trixie
purl pkg:deb/debian/bzip2@1.0.8-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-6%3Fdistro=trixie
aliases CVE-2005-0758
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uf6e-fsw6-bbbv
7
url VCID-x9p2-nwrm-pudk
vulnerability_id VCID-x9p2-nwrm-pudk
summary A Denial of Service vulnerability was discovered in Analog.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1372.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1372.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1372
reference_id
reference_type
scores
0
value 0.07739
scoring_system epss
scoring_elements 0.91898
published_at 2026-04-01T12:55:00Z
1
value 0.07739
scoring_system epss
scoring_elements 0.91906
published_at 2026-04-02T12:55:00Z
2
value 0.07739
scoring_system epss
scoring_elements 0.91913
published_at 2026-04-04T12:55:00Z
3
value 0.07739
scoring_system epss
scoring_elements 0.9192
published_at 2026-04-07T12:55:00Z
4
value 0.07739
scoring_system epss
scoring_elements 0.91933
published_at 2026-04-08T12:55:00Z
5
value 0.07739
scoring_system epss
scoring_elements 0.91938
published_at 2026-04-13T12:55:00Z
6
value 0.07739
scoring_system epss
scoring_elements 0.91942
published_at 2026-04-11T12:55:00Z
7
value 0.07739
scoring_system epss
scoring_elements 0.91941
published_at 2026-04-12T12:55:00Z
8
value 0.07739
scoring_system epss
scoring_elements 0.91957
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1372
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1372
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1372
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=438118
reference_id 438118
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=438118
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=471670
reference_id 471670
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=471670
5
reference_url https://security.gentoo.org/glsa/200804-02
reference_id GLSA-200804-02
reference_type
scores
url https://security.gentoo.org/glsa/200804-02
6
reference_url https://security.gentoo.org/glsa/200903-40
reference_id GLSA-200903-40
reference_type
scores
url https://security.gentoo.org/glsa/200903-40
7
reference_url https://access.redhat.com/errata/RHSA-2008:0893
reference_id RHSA-2008:0893
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0893
8
reference_url https://usn.ubuntu.com/590-1/
reference_id USN-590-1
reference_type
scores
url https://usn.ubuntu.com/590-1/
fixed_packages
0
url pkg:deb/debian/bzip2@1.0.5-0.1?distro=trixie
purl pkg:deb/debian/bzip2@1.0.5-0.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.5-0.1%3Fdistro=trixie
1
url pkg:deb/debian/bzip2@1.0.8-4?distro=trixie
purl pkg:deb/debian/bzip2@1.0.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-4%3Fdistro=trixie
2
url pkg:deb/debian/bzip2@1.0.8-5?distro=trixie
purl pkg:deb/debian/bzip2@1.0.8-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-5%3Fdistro=trixie
3
url pkg:deb/debian/bzip2@1.0.8-6?distro=trixie
purl pkg:deb/debian/bzip2@1.0.8-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-6%3Fdistro=trixie
aliases CVE-2008-1372
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x9p2-nwrm-pudk
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-4%3Fdistro=trixie