Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/net-misc/putty@0.55
Typeebuild
Namespacenet-misc
Nameputty
Version0.55
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version0.56
Latest_non_vulnerable_version0.81
Affected_by_vulnerabilities
0
url VCID-wgxn-vy57-pbhk
vulnerability_id VCID-wgxn-vy57-pbhk
summary
PuTTY contains a vulnerability allowing an SSH server to execute arbitrary
    code on the connecting client.
references
0
reference_url http://marc.info/?l=bugtraq&m=109889312917613&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=109889312917613&w=2
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-1008
reference_id
reference_type
scores
0
value 0.09179
scoring_system epss
scoring_elements 0.92712
published_at 2026-04-21T12:55:00Z
1
value 0.09179
scoring_system epss
scoring_elements 0.92662
published_at 2026-04-01T12:55:00Z
2
value 0.09179
scoring_system epss
scoring_elements 0.92669
published_at 2026-04-02T12:55:00Z
3
value 0.09179
scoring_system epss
scoring_elements 0.92675
published_at 2026-04-07T12:55:00Z
4
value 0.09179
scoring_system epss
scoring_elements 0.92685
published_at 2026-04-08T12:55:00Z
5
value 0.09179
scoring_system epss
scoring_elements 0.9269
published_at 2026-04-09T12:55:00Z
6
value 0.09179
scoring_system epss
scoring_elements 0.92696
published_at 2026-04-11T12:55:00Z
7
value 0.09179
scoring_system epss
scoring_elements 0.92695
published_at 2026-04-13T12:55:00Z
8
value 0.09179
scoring_system epss
scoring_elements 0.92708
published_at 2026-04-16T12:55:00Z
9
value 0.09179
scoring_system epss
scoring_elements 0.92707
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-1008
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1008
3
reference_url http://secunia.com/advisories/12987/
reference_id
reference_type
scores
url http://secunia.com/advisories/12987/
4
reference_url http://secunia.com/advisories/13012/
reference_id
reference_type
scores
url http://secunia.com/advisories/13012/
5
reference_url http://secunia.com/advisories/17214
reference_id
reference_type
scores
url http://secunia.com/advisories/17214
6
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/17886
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/17886
7
reference_url http://www-1.ibm.com/support/docview.wss?uid=ssg1S1002414
reference_id
reference_type
scores
url http://www-1.ibm.com/support/docview.wss?uid=ssg1S1002414
8
reference_url http://www-1.ibm.com/support/docview.wss?uid=ssg1S1002416
reference_id
reference_type
scores
url http://www-1.ibm.com/support/docview.wss?uid=ssg1S1002416
9
reference_url http://www.chiark.greenend.org.uk/~sgtatham/putty/
reference_id
reference_type
scores
url http://www.chiark.greenend.org.uk/~sgtatham/putty/
10
reference_url http://www.gentoo.org/security/en/glsa/glsa-200410-29.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200410-29.xml
11
reference_url http://www.idefense.com/application/poi/display?id=155&type=vulnerabilities&flashstatus=true
reference_id
reference_type
scores
url http://www.idefense.com/application/poi/display?id=155&type=vulnerabilities&flashstatus=true
12
reference_url http://www.securityfocus.com/bid/11549
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/11549
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.48:*:*:*:*:*:*:*
reference_id cpe:2.3:a:putty:putty:0.48:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.48:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.49:*:*:*:*:*:*:*
reference_id cpe:2.3:a:putty:putty:0.49:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.49:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.50:*:*:*:*:*:*:*
reference_id cpe:2.3:a:putty:putty:0.50:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.50:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.51:*:*:*:*:*:*:*
reference_id cpe:2.3:a:putty:putty:0.51:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.51:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.52:*:*:*:*:*:*:*
reference_id cpe:2.3:a:putty:putty:0.52:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.52:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.53:*:*:*:*:*:*:*
reference_id cpe:2.3:a:putty:putty:0.53:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.53:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.53b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:putty:putty:0.53b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.53b:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.54:*:*:*:*:*:*:*
reference_id cpe:2.3:a:putty:putty:0.54:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.54:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.55:*:*:*:*:*:*:*
reference_id cpe:2.3:a:putty:putty:0.55:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:putty:putty:0.55:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tortoisecvs:tortoisecvs:1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:tortoisecvs:tortoisecvs:1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tortoisecvs:tortoisecvs:1.8:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2004-1008
reference_id CVE-2004-1008
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2004-1008
24
reference_url https://security.gentoo.org/glsa/200410-29
reference_id GLSA-200410-29
reference_type
scores
url https://security.gentoo.org/glsa/200410-29
fixed_packages
0
url pkg:ebuild/net-misc/putty@0.56
purl pkg:ebuild/net-misc/putty@0.56
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/putty@0.56
aliases CVE-2004-1008
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wgxn-vy57-pbhk
Fixing_vulnerabilities
0
url VCID-9fwx-3bsq-q3e9
vulnerability_id VCID-9fwx-3bsq-q3e9
summary
PuTTY contains a vulnerability allowing a SSH server to execute arbitrary
    code on the connecting client.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-1440
reference_id
reference_type
scores
0
value 0.03466
scoring_system epss
scoring_elements 0.87481
published_at 2026-04-01T12:55:00Z
1
value 0.03466
scoring_system epss
scoring_elements 0.87491
published_at 2026-04-02T12:55:00Z
2
value 0.03466
scoring_system epss
scoring_elements 0.87505
published_at 2026-04-04T12:55:00Z
3
value 0.03466
scoring_system epss
scoring_elements 0.87507
published_at 2026-04-07T12:55:00Z
4
value 0.03466
scoring_system epss
scoring_elements 0.87527
published_at 2026-04-08T12:55:00Z
5
value 0.03466
scoring_system epss
scoring_elements 0.87533
published_at 2026-04-09T12:55:00Z
6
value 0.03466
scoring_system epss
scoring_elements 0.87545
published_at 2026-04-11T12:55:00Z
7
value 0.03466
scoring_system epss
scoring_elements 0.8754
published_at 2026-04-12T12:55:00Z
8
value 0.03466
scoring_system epss
scoring_elements 0.87537
published_at 2026-04-13T12:55:00Z
9
value 0.03466
scoring_system epss
scoring_elements 0.87551
published_at 2026-04-16T12:55:00Z
10
value 0.03466
scoring_system epss
scoring_elements 0.87552
published_at 2026-04-18T12:55:00Z
11
value 0.03466
scoring_system epss
scoring_elements 0.8755
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-1440
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1440
2
reference_url https://security.gentoo.org/glsa/200408-04
reference_id GLSA-200408-04
reference_type
scores
url https://security.gentoo.org/glsa/200408-04
fixed_packages
0
url pkg:ebuild/net-misc/putty@0.55
purl pkg:ebuild/net-misc/putty@0.55
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-wgxn-vy57-pbhk
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/putty@0.55
aliases CVE-2004-1440
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9fwx-3bsq-q3e9
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/net-misc/putty@0.55