Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/7zip@26.00%2Bdfsg-4?distro=trixie
Typedeb
Namespacedebian
Name7zip
Version26.00+dfsg-4
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version26.00+dfsg1-2
Latest_non_vulnerable_version26.00+dfsg1-3
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-bzcx-rxg3-aygs
vulnerability_id VCID-bzcx-rxg3-aygs
summary
7-Zip Zstandard Decompression Integer Underflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the implementation of Zstandard decompression. The issue results from the lack of proper validation of user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24346.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-11477
reference_id
reference_type
scores
0
value 0.38072
scoring_system epss
scoring_elements 0.97213
published_at 2026-04-09T12:55:00Z
1
value 0.38072
scoring_system epss
scoring_elements 0.97217
published_at 2026-04-12T12:55:00Z
2
value 0.38072
scoring_system epss
scoring_elements 0.97216
published_at 2026-04-11T12:55:00Z
3
value 0.38072
scoring_system epss
scoring_elements 0.97195
published_at 2026-04-02T12:55:00Z
4
value 0.38072
scoring_system epss
scoring_elements 0.97201
published_at 2026-04-04T12:55:00Z
5
value 0.38072
scoring_system epss
scoring_elements 0.97202
published_at 2026-04-07T12:55:00Z
6
value 0.38072
scoring_system epss
scoring_elements 0.97211
published_at 2026-04-08T12:55:00Z
7
value 0.43636
scoring_system epss
scoring_elements 0.97532
published_at 2026-04-21T12:55:00Z
8
value 0.43636
scoring_system epss
scoring_elements 0.97521
published_at 2026-04-13T12:55:00Z
9
value 0.43636
scoring_system epss
scoring_elements 0.97529
published_at 2026-04-16T12:55:00Z
10
value 0.43636
scoring_system epss
scoring_elements 0.9753
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-11477
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://www.zerodayinitiative.com/advisories/ZDI-24-1532/
reference_id ZDI-24-1532
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-30T04:55:53Z/
url https://www.zerodayinitiative.com/advisories/ZDI-24-1532/
fixed_packages
0
url pkg:deb/debian/7zip@0?distro=trixie
purl pkg:deb/debian/7zip@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/7zip@0%3Fdistro=trixie
1
url pkg:deb/debian/7zip@22.01%2Bdfsg-8%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/7zip@22.01%2Bdfsg-8%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6qgu-7h5h-1bed
1
vulnerability VCID-6xnz-5ctc-fkbk
2
vulnerability VCID-ne48-dtxr-2ybq
3
vulnerability VCID-pgke-8ce4-uybu
4
vulnerability VCID-q99c-7ggg-wyep
5
vulnerability VCID-rnzv-mnjr-rfby
6
vulnerability VCID-ymuu-t8yt-4kbk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/7zip@22.01%252Bdfsg-8%252Bdeb12u1%3Fdistro=trixie
2
url pkg:deb/debian/7zip@24.07%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/7zip@24.07%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/7zip@24.07%252Bdfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/7zip@25.01%2Bdfsg-1~deb13u1?distro=trixie
purl pkg:deb/debian/7zip@25.01%2Bdfsg-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/7zip@25.01%252Bdfsg-1~deb13u1%3Fdistro=trixie
4
url pkg:deb/debian/7zip@26.00%2Bdfsg-4?distro=trixie
purl pkg:deb/debian/7zip@26.00%2Bdfsg-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/7zip@26.00%252Bdfsg-4%3Fdistro=trixie
5
url pkg:deb/debian/7zip@26.00%2Bdfsg1-2?distro=trixie
purl pkg:deb/debian/7zip@26.00%2Bdfsg1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/7zip@26.00%252Bdfsg1-2%3Fdistro=trixie
6
url pkg:deb/debian/7zip@26.00%2Bdfsg1-3?distro=trixie
purl pkg:deb/debian/7zip@26.00%2Bdfsg1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/7zip@26.00%252Bdfsg1-3%3Fdistro=trixie
aliases CVE-2024-11477
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bzcx-rxg3-aygs
1
url VCID-h4pw-pga4-77ex
vulnerability_id VCID-h4pw-pga4-77ex
summary
7-Zip Mark-of-the-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of 7-Zip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the handling of archived files. When extracting files from a crafted archive that bears the Mark-of-the-Web, 7-Zip does not propagate the Mark-of-the-Web to the extracted files. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user. Was ZDI-CAN-25456.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-0411
reference_id
reference_type
scores
0
value 0.52406
scoring_system epss
scoring_elements 0.97939
published_at 2026-04-18T12:55:00Z
1
value 0.52406
scoring_system epss
scoring_elements 0.97913
published_at 2026-04-02T12:55:00Z
2
value 0.52406
scoring_system epss
scoring_elements 0.9793
published_at 2026-04-12T12:55:00Z
3
value 0.52406
scoring_system epss
scoring_elements 0.97932
published_at 2026-04-13T12:55:00Z
4
value 0.52406
scoring_system epss
scoring_elements 0.97938
published_at 2026-04-21T12:55:00Z
5
value 0.52406
scoring_system epss
scoring_elements 0.97915
published_at 2026-04-04T12:55:00Z
6
value 0.52406
scoring_system epss
scoring_elements 0.97918
published_at 2026-04-07T12:55:00Z
7
value 0.52406
scoring_system epss
scoring_elements 0.97923
published_at 2026-04-08T12:55:00Z
8
value 0.52406
scoring_system epss
scoring_elements 0.97926
published_at 2026-04-09T12:55:00Z
9
value 0.52406
scoring_system epss
scoring_elements 0.97929
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-0411
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://www.zerodayinitiative.com/advisories/ZDI-25-045/
reference_id ZDI-25-045
reference_type
scores
0
value 7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-07T04:55:28Z/
url https://www.zerodayinitiative.com/advisories/ZDI-25-045/
fixed_packages
0
url pkg:deb/debian/7zip@0?distro=trixie
purl pkg:deb/debian/7zip@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/7zip@0%3Fdistro=trixie
1
url pkg:deb/debian/7zip@22.01%2Bdfsg-8%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/7zip@22.01%2Bdfsg-8%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6qgu-7h5h-1bed
1
vulnerability VCID-6xnz-5ctc-fkbk
2
vulnerability VCID-ne48-dtxr-2ybq
3
vulnerability VCID-pgke-8ce4-uybu
4
vulnerability VCID-q99c-7ggg-wyep
5
vulnerability VCID-rnzv-mnjr-rfby
6
vulnerability VCID-ymuu-t8yt-4kbk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/7zip@22.01%252Bdfsg-8%252Bdeb12u1%3Fdistro=trixie
2
url pkg:deb/debian/7zip@25.01%2Bdfsg-1~deb13u1?distro=trixie
purl pkg:deb/debian/7zip@25.01%2Bdfsg-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/7zip@25.01%252Bdfsg-1~deb13u1%3Fdistro=trixie
3
url pkg:deb/debian/7zip@26.00%2Bdfsg-4?distro=trixie
purl pkg:deb/debian/7zip@26.00%2Bdfsg-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/7zip@26.00%252Bdfsg-4%3Fdistro=trixie
4
url pkg:deb/debian/7zip@26.00%2Bdfsg1-2?distro=trixie
purl pkg:deb/debian/7zip@26.00%2Bdfsg1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/7zip@26.00%252Bdfsg1-2%3Fdistro=trixie
5
url pkg:deb/debian/7zip@26.00%2Bdfsg1-3?distro=trixie
purl pkg:deb/debian/7zip@26.00%2Bdfsg1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/7zip@26.00%252Bdfsg1-3%3Fdistro=trixie
aliases CVE-2025-0411
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h4pw-pga4-77ex
2
url VCID-hgkj-wq8u-q3eh
vulnerability_id VCID-hgkj-wq8u-q3eh
summary The NtfsHandler.cpp NTFS handler in 7-Zip before 24.01 (for 7zz) contains a heap-based buffer overflow that allows an attacker to overwrite two bytes at multiple offsets beyond the allocated buffer size: buffer+512*i-2, for i=9, i=10, i=11, etc.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-52168
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22646
published_at 2026-04-16T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.2263
published_at 2026-04-13T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22594
published_at 2026-04-21T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22643
published_at 2026-04-18T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31571
published_at 2026-04-04T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31528
published_at 2026-04-02T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31388
published_at 2026-04-07T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31441
published_at 2026-04-08T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31472
published_at 2026-04-09T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31476
published_at 2026-04-11T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.31433
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-52168
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52168
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52168
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://www.openwall.com/lists/oss-security/2024/07/03/10
reference_id 10
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-11T19:17:52Z/
url https://www.openwall.com/lists/oss-security/2024/07/03/10
4
reference_url http://www.openwall.com/lists/oss-security/2024/07/03/10
reference_id 10
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-11T19:17:52Z/
url http://www.openwall.com/lists/oss-security/2024/07/03/10
5
reference_url https://sourceforge.net/p/sevenzip/bugs/2402/
reference_id 2402
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-11T19:17:52Z/
url https://sourceforge.net/p/sevenzip/bugs/2402/
6
reference_url https://usn.ubuntu.com/7438-1/
reference_id USN-7438-1
reference_type
scores
url https://usn.ubuntu.com/7438-1/
7
reference_url https://dfir.ru/2024/06/19/vulnerabilities-in-7-zip-and-ntfs3/
reference_id vulnerabilities-in-7-zip-and-ntfs3
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-11T19:17:52Z/
url https://dfir.ru/2024/06/19/vulnerabilities-in-7-zip-and-ntfs3/
fixed_packages
0
url pkg:deb/debian/7zip@22.01%2Bdfsg-8%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/7zip@22.01%2Bdfsg-8%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6qgu-7h5h-1bed
1
vulnerability VCID-6xnz-5ctc-fkbk
2
vulnerability VCID-ne48-dtxr-2ybq
3
vulnerability VCID-pgke-8ce4-uybu
4
vulnerability VCID-q99c-7ggg-wyep
5
vulnerability VCID-rnzv-mnjr-rfby
6
vulnerability VCID-ymuu-t8yt-4kbk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/7zip@22.01%252Bdfsg-8%252Bdeb12u1%3Fdistro=trixie
1
url pkg:deb/debian/7zip@24.05%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/7zip@24.05%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/7zip@24.05%252Bdfsg-1%3Fdistro=trixie
2
url pkg:deb/debian/7zip@25.01%2Bdfsg-1~deb13u1?distro=trixie
purl pkg:deb/debian/7zip@25.01%2Bdfsg-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/7zip@25.01%252Bdfsg-1~deb13u1%3Fdistro=trixie
3
url pkg:deb/debian/7zip@26.00%2Bdfsg-4?distro=trixie
purl pkg:deb/debian/7zip@26.00%2Bdfsg-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/7zip@26.00%252Bdfsg-4%3Fdistro=trixie
4
url pkg:deb/debian/7zip@26.00%2Bdfsg1-2?distro=trixie
purl pkg:deb/debian/7zip@26.00%2Bdfsg1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/7zip@26.00%252Bdfsg1-2%3Fdistro=trixie
5
url pkg:deb/debian/7zip@26.00%2Bdfsg1-3?distro=trixie
purl pkg:deb/debian/7zip@26.00%2Bdfsg1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/7zip@26.00%252Bdfsg1-3%3Fdistro=trixie
aliases CVE-2023-52168
risk_score 3.8
exploitability 0.5
weighted_severity 7.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hgkj-wq8u-q3eh
3
url VCID-uebs-8u4d-3bd1
vulnerability_id VCID-uebs-8u4d-3bd1
summary The NtfsHandler.cpp NTFS handler in 7-Zip before 24.01 (for 7zz) contains an out-of-bounds read that allows an attacker to read beyond the intended buffer. The bytes read beyond the intended buffer are presented as a part of a filename listed in the file system image. This has security relevance in some known web-service use cases where untrusted users can upload files and have them extracted by a server-side 7-Zip process.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-52169
reference_id
reference_type
scores
0
value 0.00175
scoring_system epss
scoring_elements 0.39106
published_at 2026-04-16T12:55:00Z
1
value 0.00175
scoring_system epss
scoring_elements 0.3905
published_at 2026-04-13T12:55:00Z
2
value 0.00175
scoring_system epss
scoring_elements 0.38989
published_at 2026-04-21T12:55:00Z
3
value 0.00175
scoring_system epss
scoring_elements 0.39076
published_at 2026-04-18T12:55:00Z
4
value 0.00286
scoring_system epss
scoring_elements 0.52063
published_at 2026-04-04T12:55:00Z
5
value 0.00286
scoring_system epss
scoring_elements 0.52037
published_at 2026-04-02T12:55:00Z
6
value 0.00286
scoring_system epss
scoring_elements 0.52028
published_at 2026-04-07T12:55:00Z
7
value 0.00286
scoring_system epss
scoring_elements 0.52083
published_at 2026-04-08T12:55:00Z
8
value 0.00286
scoring_system epss
scoring_elements 0.52079
published_at 2026-04-09T12:55:00Z
9
value 0.00286
scoring_system epss
scoring_elements 0.52131
published_at 2026-04-11T12:55:00Z
10
value 0.00286
scoring_system epss
scoring_elements 0.52114
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-52169
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-52169
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://www.openwall.com/lists/oss-security/2024/07/03/10
reference_id 10
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-21T16:47:13Z/
url https://www.openwall.com/lists/oss-security/2024/07/03/10
4
reference_url http://www.openwall.com/lists/oss-security/2024/07/03/10
reference_id 10
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-21T16:47:13Z/
url http://www.openwall.com/lists/oss-security/2024/07/03/10
5
reference_url https://sourceforge.net/p/sevenzip/bugs/2402/
reference_id 2402
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-21T16:47:13Z/
url https://sourceforge.net/p/sevenzip/bugs/2402/
6
reference_url https://usn.ubuntu.com/7438-1/
reference_id USN-7438-1
reference_type
scores
url https://usn.ubuntu.com/7438-1/
7
reference_url https://dfir.ru/2024/06/19/vulnerabilities-in-7-zip-and-ntfs3/
reference_id vulnerabilities-in-7-zip-and-ntfs3
reference_type
scores
0
value 8.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-21T16:47:13Z/
url https://dfir.ru/2024/06/19/vulnerabilities-in-7-zip-and-ntfs3/
fixed_packages
0
url pkg:deb/debian/7zip@22.01%2Bdfsg-8%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/7zip@22.01%2Bdfsg-8%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6qgu-7h5h-1bed
1
vulnerability VCID-6xnz-5ctc-fkbk
2
vulnerability VCID-ne48-dtxr-2ybq
3
vulnerability VCID-pgke-8ce4-uybu
4
vulnerability VCID-q99c-7ggg-wyep
5
vulnerability VCID-rnzv-mnjr-rfby
6
vulnerability VCID-ymuu-t8yt-4kbk
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/7zip@22.01%252Bdfsg-8%252Bdeb12u1%3Fdistro=trixie
1
url pkg:deb/debian/7zip@24.05%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/7zip@24.05%2Bdfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/7zip@24.05%252Bdfsg-1%3Fdistro=trixie
2
url pkg:deb/debian/7zip@25.01%2Bdfsg-1~deb13u1?distro=trixie
purl pkg:deb/debian/7zip@25.01%2Bdfsg-1~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/7zip@25.01%252Bdfsg-1~deb13u1%3Fdistro=trixie
3
url pkg:deb/debian/7zip@26.00%2Bdfsg-4?distro=trixie
purl pkg:deb/debian/7zip@26.00%2Bdfsg-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/7zip@26.00%252Bdfsg-4%3Fdistro=trixie
4
url pkg:deb/debian/7zip@26.00%2Bdfsg1-2?distro=trixie
purl pkg:deb/debian/7zip@26.00%2Bdfsg1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/7zip@26.00%252Bdfsg1-2%3Fdistro=trixie
5
url pkg:deb/debian/7zip@26.00%2Bdfsg1-3?distro=trixie
purl pkg:deb/debian/7zip@26.00%2Bdfsg1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/7zip@26.00%252Bdfsg1-3%3Fdistro=trixie
aliases CVE-2023-52169
risk_score 3.7
exploitability 0.5
weighted_severity 7.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uebs-8u4d-3bd1
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/7zip@26.00%252Bdfsg-4%3Fdistro=trixie