Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/582238?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/582238?format=api", "purl": "pkg:deb/debian/bzip2@1.0.8-5?distro=trixie", "type": "deb", "namespace": "debian", "name": "bzip2", "version": "1.0.8-5", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "1.0.8-6", "latest_non_vulnerable_version": "1.0.8-6", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90622?format=api", "vulnerability_id": "VCID-569v-spq6-dbhv", "summary": "The bzexe command in bzip2 1.0.5 and earlier generates compressed executables that do not properly handle temporary files during extraction, which allows local users to execute arbitrary code by precreating a temporary directory.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4089.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4089.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4089", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35722", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.3592", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.3595", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35781", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35831", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35854", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35861", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.3582", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35797", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35836", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-4089" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4089", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4089" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=632862", "reference_id": "632862", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=632862" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/18147.c", "reference_id": "CVE-2011-4089;OSVDB-77356", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/18147.c" }, { "reference_url": "https://usn.ubuntu.com/1308-1/", "reference_id": "USN-1308-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1308-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/586722?format=api", "purl": "pkg:deb/debian/bzip2@1.0.6-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582237?format=api", "purl": "pkg:deb/debian/bzip2@1.0.8-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582238?format=api", "purl": "pkg:deb/debian/bzip2@1.0.8-5?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582239?format=api", "purl": "pkg:deb/debian/bzip2@1.0.8-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-6%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-4089" ], "risk_score": null, "exploitability": "2.0", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-569v-spq6-dbhv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89153?format=api", "vulnerability_id": "VCID-6u8f-799b-sff1", "summary": "security flaw", "references": [ { "reference_url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-004.txt.asc", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2008-004.txt.asc" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc" }, { "reference_url": "http://docs.info.apple.com/article.html?artnum=307041", "reference_id": "", "reference_type": "", "scores": [], "url": "http://docs.info.apple.com/article.html?artnum=307041" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html" }, { "reference_url": "http://marc.info/?l=bugtraq&m=111229375217633&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=111229375217633&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0953.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0953.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-0953", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26185", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26308", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26349", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26389", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26162", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.2623", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26278", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26285", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.2624", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26181", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-0953" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0953", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0953" }, { "reference_url": "http://secunia.com/advisories/19183", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19183" }, { "reference_url": "http://secunia.com/advisories/27274", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/27274" }, { "reference_url": "http://secunia.com/advisories/27643", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/27643" }, { "reference_url": "http://secunia.com/advisories/29940", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/29940" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19926", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19926" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10902", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10902" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1154", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1154" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103118-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103118-1" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200191-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200191-1" }, { "reference_url": "http://www.debian.org/security/2005/dsa-730", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-730" }, { "reference_url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_158801__Updated_bzip2_packages_fix_security_issues.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_158801__Updated_bzip2_packages_fix_security_issues.html" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:026", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:026" }, { "reference_url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.002.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-474.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-474.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/456430/30/8730/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/456430/30/8730/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/12954", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/12954" }, { "reference_url": "http://www.securityfocus.com/bid/26444", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/26444" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA07-319A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA07-319A.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/3525", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/3525" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/3868", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/3868" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617590", "reference_id": "1617590", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617590" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:0.9.5_a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:0.9.5_b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:0.9.5_c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_d:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:0.9.5_d:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_d:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9_a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:0.9_a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9_a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9_b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:0.9_b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9_b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9_c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:0.9_c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9_c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0953", "reference_id": "CVE-2005-0953", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0953" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:474", "reference_id": "RHSA-2005:474", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:474" }, { "reference_url": "https://usn.ubuntu.com/127-1/", "reference_id": "USN-127-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/127-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584997?format=api", "purl": "pkg:deb/debian/bzip2@1.0.2-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.2-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582237?format=api", "purl": "pkg:deb/debian/bzip2@1.0.8-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582238?format=api", "purl": "pkg:deb/debian/bzip2@1.0.8-5?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582239?format=api", "purl": "pkg:deb/debian/bzip2@1.0.8-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-6%3Fdistro=trixie" } ], "aliases": [ "CVE-2005-0953" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6u8f-799b-sff1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47802?format=api", "vulnerability_id": "VCID-azhe-cxb8-3kbb", "summary": "Multiple vulnerabilities were found in Clam AntiVirus, the most\n severe of which may allow the execution of arbitrary code.", "references": [ { "reference_url": "http://blogs.sun.com/security/entry/cve_2010_0405_integer_overflow", "reference_id": "", "reference_type": "", "scores": [], "url": "http://blogs.sun.com/security/entry/cve_2010_0405_integer_overflow" }, { "reference_url": "http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob_plain%3Bf=ChangeLog%3Bhb=clamav-0.96.3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob_plain%3Bf=ChangeLog%3Bhb=clamav-0.96.3" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051278.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051278.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051366.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051366.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=128506868510655&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=128506868510655&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0405.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0405.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0405", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07688", "scoring_system": "epss", "scoring_elements": "0.91929", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07688", "scoring_system": "epss", "scoring_elements": "0.91871", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07688", "scoring_system": "epss", "scoring_elements": "0.91879", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07688", "scoring_system": "epss", "scoring_elements": "0.91886", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07688", "scoring_system": "epss", "scoring_elements": "0.91893", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07688", "scoring_system": "epss", "scoring_elements": "0.91905", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07688", "scoring_system": "epss", "scoring_elements": "0.91911", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07688", "scoring_system": "epss", "scoring_elements": "0.91914", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07688", "scoring_system": "epss", "scoring_elements": "0.9191", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0405" }, { "reference_url": "http://secunia.com/advisories/41452", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/41452" }, { "reference_url": "http://secunia.com/advisories/41505", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/41505" }, { "reference_url": "http://secunia.com/advisories/42350", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42350" }, { "reference_url": "http://secunia.com/advisories/42404", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42404" }, { "reference_url": "http://secunia.com/advisories/42405", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42405" }, { "reference_url": "http://secunia.com/advisories/42529", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42529" }, { "reference_url": "http://secunia.com/advisories/42530", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42530" }, { "reference_url": "http://secunia.com/advisories/48378", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48378" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201301-05.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201301-05.xml" }, { "reference_url": "http://support.apple.com/kb/HT4581", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4581" }, { "reference_url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2230", "reference_id": "", "reference_type": "", "scores": [], "url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2230" }, { "reference_url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2231", "reference_id": "", "reference_type": "", "scores": [], "url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2231" }, { "reference_url": "http://www.bzip.org/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.bzip.org/" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0703.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0703.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0858.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0858.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/515055/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/515055/100/0/threaded" }, { "reference_url": "http://www.ubuntu.com/usn/usn-986-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-986-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-986-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-986-2" }, { "reference_url": "http://www.ubuntu.com/usn/USN-986-3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-986-3" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2010-0019.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0019.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2455", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2455" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3043", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3043" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3052", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3052" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3073", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3073" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3126", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3126" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3127", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3127" }, { "reference_url": "http://xorl.wordpress.com/2010/09/21/cve-2010-0405-bzip2-integer-overflow/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://xorl.wordpress.com/2010/09/21/cve-2010-0405-bzip2-integer-overflow/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=627882", "reference_id": "627882", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=627882" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:0.9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.0a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:0.9.0a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.0a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.0b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:0.9.0b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.0b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.0c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:0.9.0c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.0c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:0.9.5_a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:0.9.5a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:0.9.5_b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:0.9.5b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:0.9.5_c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:0.9.5c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_d:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:0.9.5_d:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5_d:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5d:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:0.9.5d:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9.5d:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9_a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:0.9_a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9_a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9_b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:0.9_b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9_b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9_c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:0.9_c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:0.9_c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libzip2:libzip2:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libzip2:libzip2:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libzip2:libzip2:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0405", "reference_id": "CVE-2010-0405", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0405" }, { "reference_url": "https://security.gentoo.org/glsa/201110-20", "reference_id": "GLSA-201110-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201110-20" }, { "reference_url": "https://security.gentoo.org/glsa/201301-05", "reference_id": "GLSA-201301-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-05" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0703", "reference_id": "RHSA-2010:0703", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0703" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0858", "reference_id": "RHSA-2010:0858", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0858" }, { "reference_url": "https://usn.ubuntu.com/986-1/", "reference_id": "USN-986-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/986-1/" }, { "reference_url": "https://usn.ubuntu.com/986-2/", "reference_id": "USN-986-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/986-2/" }, { "reference_url": "https://usn.ubuntu.com/986-3/", "reference_id": "USN-986-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/986-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/584044?format=api", "purl": "pkg:deb/debian/bzip2@1.0.5-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.5-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582237?format=api", "purl": "pkg:deb/debian/bzip2@1.0.8-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582238?format=api", "purl": "pkg:deb/debian/bzip2@1.0.8-5?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582239?format=api", "purl": "pkg:deb/debian/bzip2@1.0.8-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-6%3Fdistro=trixie" } ], "aliases": [ "CVE-2010-0405" ], "risk_score": 2.3, "exploitability": "0.5", "weighted_severity": "4.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-azhe-cxb8-3kbb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89226?format=api", "vulnerability_id": "VCID-fsmc-8exe-j3f6", "summary": "security flaw", "references": [ { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc" }, { "reference_url": "http://docs.info.apple.com/article.html?artnum=307041", "reference_id": "", "reference_type": "", "scores": [], "url": "http://docs.info.apple.com/article.html?artnum=307041" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1260.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1260.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-1260", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09796", "scoring_system": "epss", "scoring_elements": "0.92972", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.09796", "scoring_system": "epss", "scoring_elements": "0.92935", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09796", "scoring_system": "epss", "scoring_elements": "0.92943", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.09796", "scoring_system": "epss", "scoring_elements": "0.92947", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.09796", "scoring_system": "epss", "scoring_elements": "0.92954", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.09796", "scoring_system": "epss", "scoring_elements": "0.92959", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.09796", "scoring_system": "epss", "scoring_elements": "0.92963", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.09796", "scoring_system": "epss", "scoring_elements": "0.92961", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.09796", "scoring_system": "epss", "scoring_elements": "0.92962", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-1260" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1260", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1260" }, { "reference_url": "http://secunia.com/advisories/15447", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/15447" }, { "reference_url": "http://secunia.com/advisories/19183", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19183" }, { "reference_url": "http://secunia.com/advisories/27274", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/27274" }, { "reference_url": "http://secunia.com/advisories/27643", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/27643" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10700", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10700" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A749", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A749" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103118-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-103118-1" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200191-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200191-1" }, { "reference_url": "http://www.debian.org/security/2005/dsa-741", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-741" }, { "reference_url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_158801__Updated_bzip2_packages_fix_security_issues.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_158801__Updated_bzip2_packages_fix_security_issues.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-474.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-474.html" }, { "reference_url": "http://www.securityfocus.com/bid/13657", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/13657" }, { "reference_url": "http://www.securityfocus.com/bid/26444", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/26444" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA07-319A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA07-319A.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/3525", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/3525" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/3868", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/3868" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617617", "reference_id": "1617617", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617617" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1260", "reference_id": "CVE-2005-1260", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1260" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:474", "reference_id": "RHSA-2005:474", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:474" }, { "reference_url": "https://usn.ubuntu.com/127-1/", "reference_id": "USN-127-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/127-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/586946?format=api", "purl": "pkg:deb/debian/bzip2@1.0.2-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.2-7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582237?format=api", "purl": "pkg:deb/debian/bzip2@1.0.8-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582238?format=api", "purl": "pkg:deb/debian/bzip2@1.0.8-5?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582239?format=api", "purl": "pkg:deb/debian/bzip2@1.0.8-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-6%3Fdistro=trixie" } ], "aliases": [ "CVE-2005-1260" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fsmc-8exe-j3f6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72794?format=api", "vulnerability_id": "VCID-n51n-m2r7-kbdy", "summary": "bzip2: bzip2: Data integrity error when decompressing (with data integrity tests fail).", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12900.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12900.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12900", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01111", "scoring_system": "epss", "scoring_elements": "0.7818", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01111", "scoring_system": "epss", "scoring_elements": "0.78146", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01111", "scoring_system": "epss", "scoring_elements": "0.7815", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01111", "scoring_system": "epss", "scoring_elements": "0.78168", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01111", "scoring_system": "epss", "scoring_elements": "0.78143", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01111", "scoring_system": "epss", "scoring_elements": "0.78137", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01111", "scoring_system": "epss", "scoring_elements": "0.78111", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01111", "scoring_system": "epss", "scoring_elements": "0.78129", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.78283", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01132", "scoring_system": "epss", "scoring_elements": "0.7829", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12900" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12900" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2332075", "reference_id": "2332075", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2332075" }, { "reference_url": "https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc", "reference_id": "74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/" } ], "url": "https://gitlab.com/federicomenaquintero/bzip2/commit/74de1e2e6ffc9d51ef9824db71a8ffee5962cdbc" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930886", "reference_id": "930886", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=930886" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934359", "reference_id": "934359", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934359" }, { "reference_url": "https://support.f5.com/csp/article/K68713584?utm_source=f5support&%3Butm_medium=RSS", "reference_id": "K68713584?utm_source=f5support&%3Butm_medium=RSS", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/" } ], "url": "https://support.f5.com/csp/article/K68713584?utm_source=f5support&%3Butm_medium=RSS" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html", "reference_id": "msg00012.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00012.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html", "reference_id": "msg00014.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00014.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html", "reference_id": "msg00018.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00018.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html", "reference_id": "msg00040.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00040.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html", "reference_id": "msg00050.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00050.html" }, { "reference_url": "https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774%40%3Cuser.flink.apache.org%3E", "reference_id": "rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774%40%3Cuser.flink.apache.org%3E", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/" } ], "url": "https://lists.apache.org/thread.html/rce8cd8c30f60604b580ea01bebda8a671a25c9a1629f409fc24e7774%40%3Cuser.flink.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4%40%3Cuser.flink.apache.org%3E", "reference_id": "rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4%40%3Cuser.flink.apache.org%3E", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/" } ], "url": "https://lists.apache.org/thread.html/rda98305669476c4d90cc8527c4deda7e449019dd1fe9936b56671dd4%40%3Cuser.flink.apache.org%3E" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10803", "reference_id": "RHSA-2024:10803", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10803" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8922", "reference_id": "RHSA-2024:8922", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8922" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0733", "reference_id": "RHSA-2025:0733", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0733" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0925", "reference_id": "RHSA-2025:0925", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0925" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1154", "reference_id": "RHSA-2025:1154", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1154" }, { "reference_url": "https://usn.ubuntu.com/4038-1/", "reference_id": "USN-4038-1", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/" } ], "url": "https://usn.ubuntu.com/4038-1/" }, { "reference_url": "https://usn.ubuntu.com/4038-2/", "reference_id": "USN-4038-2", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/" } ], "url": "https://usn.ubuntu.com/4038-2/" }, { "reference_url": "https://usn.ubuntu.com/4146-1/", "reference_id": "USN-4146-1", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/" } ], "url": "https://usn.ubuntu.com/4146-1/" }, { "reference_url": "https://usn.ubuntu.com/4146-2/", "reference_id": "USN-4146-2", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:54:12Z/" } ], "url": "https://usn.ubuntu.com/4146-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/586796?format=api", "purl": "pkg:deb/debian/bzip2@1.0.6-9.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.6-9.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582237?format=api", "purl": "pkg:deb/debian/bzip2@1.0.8-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582238?format=api", "purl": "pkg:deb/debian/bzip2@1.0.8-5?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582239?format=api", "purl": "pkg:deb/debian/bzip2@1.0.8-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-6%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-12900" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n51n-m2r7-kbdy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36092?format=api", "vulnerability_id": "VCID-rgbz-6485-tfan", "summary": "An use-after-free vulnerability has been found in bzip2 that could\n allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/" } ], "url": "http://packetstormsecurity.com/files/153644/Slackware-Security-Advisory-bzip2-Updates.html" }, { "reference_url": "http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/" } ], "url": "http://packetstormsecurity.com/files/153957/FreeBSD-Security-Advisory-FreeBSD-SA-19-18.bzip2.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3189.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-3189.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3189", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.23714", "scoring_system": "epss", "scoring_elements": "0.95996", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.23714", "scoring_system": "epss", "scoring_elements": "0.95993", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.23714", "scoring_system": "epss", "scoring_elements": "0.95991", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.23714", "scoring_system": "epss", "scoring_elements": "0.95977", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.23714", "scoring_system": "epss", "scoring_elements": "0.95971", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.23714", "scoring_system": "epss", "scoring_elements": "0.95982", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.23714", "scoring_system": "epss", "scoring_elements": "0.95963", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.23714", "scoring_system": "epss", "scoring_elements": "0.96008", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.23714", "scoring_system": "epss", "scoring_elements": "0.95999", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-3189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3189" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.apache.org/thread.html/r19b4a70ac52093115fd71d773a7a4f579599e6275a13cfcf6252c3e3%40%3Cjira.kafka.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/" } ], "url": "https://lists.apache.org/thread.html/r19b4a70ac52093115fd71d773a7a4f579599e6275a13cfcf6252c3e3%40%3Cjira.kafka.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r1dc4c9b3bd559301bdb1557245f78b8910146efb1ee534b774c5f6af%40%3Cdev.kafka.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/" } ], "url": "https://lists.apache.org/thread.html/r1dc4c9b3bd559301bdb1557245f78b8910146efb1ee534b774c5f6af%40%3Cdev.kafka.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r481cda41fefb03e04c51484ed14421d812e5ce9e0972edff10f37260%40%3Cjira.kafka.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/" } ], "url": "https://lists.apache.org/thread.html/r481cda41fefb03e04c51484ed14421d812e5ce9e0972edff10f37260%40%3Cjira.kafka.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r4ad2ea01354e394b7fa8c78a184b7e1634d51be9bc0e9e4d7e6c9305%40%3Cjira.kafka.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/" } ], "url": "https://lists.apache.org/thread.html/r4ad2ea01354e394b7fa8c78a184b7e1634d51be9bc0e9e4d7e6c9305%40%3Cjira.kafka.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r5f7ac2bd631ccb12ced65b71ff11f94e76d05b22000795e4a7b61203%40%3Cjira.kafka.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/" } ], "url": "https://lists.apache.org/thread.html/r5f7ac2bd631ccb12ced65b71ff11f94e76d05b22000795e4a7b61203%40%3Cjira.kafka.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r5f80cf3ade5bb73410643e885fe6b7bf9f0222daf3533e42c7ae240c%40%3Cjira.kafka.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/" } ], "url": "https://lists.apache.org/thread.html/r5f80cf3ade5bb73410643e885fe6b7bf9f0222daf3533e42c7ae240c%40%3Cjira.kafka.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r6e3962fc9f6a79851f70cffdec5759065969cec9c6708b964464b301%40%3Cjira.kafka.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/" } ], "url": "https://lists.apache.org/thread.html/r6e3962fc9f6a79851f70cffdec5759065969cec9c6708b964464b301%40%3Cjira.kafka.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b%40%3Cusers.kafka.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/" } ], "url": "https://lists.apache.org/thread.html/ra0adb9653c7de9539b93cc8434143b655f753b9f60580ff260becb2b%40%3Cusers.kafka.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/redf17d8ad16140733b25ca402ae825d6dfa9b85f73d9fb3fd0c75d73%40%3Cdev.kafka.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/" } ], "url": "https://lists.apache.org/thread.html/redf17d8ad16140733b25ca402ae825d6dfa9b85f73d9fb3fd0c75d73%40%3Cdev.kafka.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/rffebcbeaace56ff1fed7916700d2f414ca1366386fb1293e99b3e31e%40%3Cjira.kafka.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/" } ], "url": "https://lists.apache.org/thread.html/rffebcbeaace56ff1fed7916700d2f414ca1366386fb1293e99b3e31e%40%3Cjira.kafka.apache.org%3E" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00021.html" }, { "reference_url": "https://seclists.org/bugtraq/2019/Aug/4", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/" } ], "url": "https://seclists.org/bugtraq/2019/Aug/4" }, { "reference_url": "https://seclists.org/bugtraq/2019/Jul/22", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/" } ], "url": "https://seclists.org/bugtraq/2019/Jul/22" }, { "reference_url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/" } ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-19:18.bzip2.asc" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuoct2020.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/" } ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/06/20/1", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2016/06/20/1" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/" } ], "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html" }, { "reference_url": "http://www.securityfocus.com/bid/91297", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/" } ], "url": "http://www.securityfocus.com/bid/91297" }, { "reference_url": "http://www.securitytracker.com/id/1036132", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/" } ], "url": "http://www.securitytracker.com/id/1036132" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319648", "reference_id": "1319648", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1319648" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827744", "reference_id": "827744", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=827744" }, { "reference_url": "https://security.archlinux.org/ASA-201702-19", "reference_id": "ASA-201702-19", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201702-19" }, { "reference_url": "https://security.archlinux.org/AVG-4", "reference_id": "AVG-4", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-4" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bzip:bzip2:1.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bzip:bzip2:1.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:python:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3189", "reference_id": "CVE-2016-3189", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3189" }, { "reference_url": "https://security.gentoo.org/glsa/201708-08", "reference_id": "GLSA-201708-08", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/" } ], "url": "https://security.gentoo.org/glsa/201708-08" }, { "reference_url": "https://usn.ubuntu.com/4038-1/", "reference_id": "USN-4038-1", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/" } ], "url": "https://usn.ubuntu.com/4038-1/" }, { "reference_url": "https://usn.ubuntu.com/4038-2/", "reference_id": "USN-4038-2", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:58:23Z/" } ], "url": "https://usn.ubuntu.com/4038-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/583888?format=api", "purl": "pkg:deb/debian/bzip2@1.0.6-8.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.6-8.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582237?format=api", "purl": "pkg:deb/debian/bzip2@1.0.8-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582238?format=api", "purl": "pkg:deb/debian/bzip2@1.0.8-5?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582239?format=api", "purl": "pkg:deb/debian/bzip2@1.0.8-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-6%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-3189" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rgbz-6485-tfan" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89129?format=api", "vulnerability_id": "VCID-uf6e-fsw6-bbbv", "summary": "security flaw", "references": [ { "reference_url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc" }, { "reference_url": "http://bugs.gentoo.org/show_bug.cgi?id=90626", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.gentoo.org/show_bug.cgi?id=90626" }, { "reference_url": "http://docs.info.apple.com/article.html?artnum=306172", "reference_id": "", "reference_type": "", "scores": [], "url": "http://docs.info.apple.com/article.html?artnum=306172" }, { "reference_url": "http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2005-357.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0758.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0758.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-0758", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.3539", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.3559", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35615", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40416", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40437", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40399", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.4038", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40427", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40354", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40405", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-0758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0758", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0758" }, { "reference_url": "http://secunia.com/advisories/18100", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18100" }, { "reference_url": "http://secunia.com/advisories/19183", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19183" }, { "reference_url": "http://secunia.com/advisories/22033", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/22033" }, { "reference_url": "http://secunia.com/advisories/26235", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26235" }, { "reference_url": "http://securitytracker.com/id?1013928", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1013928" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20539", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20539" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1081", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1081" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1107", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1107" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9797", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9797" }, { "reference_url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_158801__Updated_bzip2_packages_fix_security_issues.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_158801__Updated_bzip2_packages_fix_security_issues.html" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200505-05.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200505-05.xml" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:026", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:026" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:027", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:027" }, { "reference_url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.002.html" }, { "reference_url": "http://www.osvdb.org/16371", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.osvdb.org/16371" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-474.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-474.html" }, { "reference_url": "http://www.securityfocus.com/bid/13582", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/13582" }, { "reference_url": "http://www.securityfocus.com/bid/25159", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/25159" }, { "reference_url": "http://www.ubuntu.com/usn/usn-158-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-158-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/2732", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/2732" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617573", "reference_id": "1617573", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617573" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=321286", "reference_id": "321286", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=321286" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:gzip:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0758", "reference_id": "CVE-2005-0758", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0758" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:357", "reference_id": "RHSA-2005:357", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:357" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:474", "reference_id": "RHSA-2005:474", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:474" }, { "reference_url": "https://usn.ubuntu.com/158-1/", "reference_id": "USN-158-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/158-1/" }, { "reference_url": "https://usn.ubuntu.com/161-1/", "reference_id": "USN-161-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/161-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/585027?format=api", "purl": "pkg:deb/debian/bzip2@1.0.2-8.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.2-8.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582237?format=api", "purl": "pkg:deb/debian/bzip2@1.0.8-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582238?format=api", "purl": "pkg:deb/debian/bzip2@1.0.8-5?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582239?format=api", "purl": "pkg:deb/debian/bzip2@1.0.8-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-6%3Fdistro=trixie" } ], "aliases": [ "CVE-2005-0758" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uf6e-fsw6-bbbv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34800?format=api", "vulnerability_id": "VCID-x9p2-nwrm-pudk", "summary": "A Denial of Service vulnerability was discovered in Analog.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1372.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1372.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1372", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07739", "scoring_system": "epss", "scoring_elements": "0.91898", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07739", "scoring_system": "epss", "scoring_elements": "0.91906", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07739", "scoring_system": "epss", "scoring_elements": "0.91913", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07739", "scoring_system": "epss", "scoring_elements": "0.9192", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07739", "scoring_system": "epss", "scoring_elements": "0.91933", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07739", "scoring_system": "epss", "scoring_elements": "0.91938", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07739", "scoring_system": "epss", "scoring_elements": "0.91942", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07739", "scoring_system": "epss", "scoring_elements": "0.91941", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07739", "scoring_system": "epss", "scoring_elements": "0.91957", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1372" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1372", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1372" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=438118", "reference_id": "438118", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=438118" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=471670", "reference_id": "471670", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=471670" }, { "reference_url": "https://security.gentoo.org/glsa/200804-02", "reference_id": "GLSA-200804-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200804-02" }, { "reference_url": "https://security.gentoo.org/glsa/200903-40", "reference_id": "GLSA-200903-40", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200903-40" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0893", "reference_id": "RHSA-2008:0893", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0893" }, { "reference_url": "https://usn.ubuntu.com/590-1/", "reference_id": "USN-590-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/590-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/582236?format=api", "purl": "pkg:deb/debian/bzip2@1.0.5-0.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.5-0.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582237?format=api", "purl": "pkg:deb/debian/bzip2@1.0.8-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582238?format=api", "purl": "pkg:deb/debian/bzip2@1.0.8-5?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/582239?format=api", "purl": "pkg:deb/debian/bzip2@1.0.8-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-6%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-1372" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x9p2-nwrm-pudk" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bzip2@1.0.8-5%3Fdistro=trixie" }