Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/gdb@17.1-4?distro=trixie
Typedeb
Namespacedebian
Namegdb
Version17.1-4
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-e8jh-cbap-87hz
vulnerability_id VCID-e8jh-cbap-87hz
summary gdb: object file .debug_gdb_scripts section improper input validation
references
0
reference_url http://rhn.redhat.com/errata/RHSA-2013-0522.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0522.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4355.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4355.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-4355
reference_id
reference_type
scores
0
value 0.00163
scoring_system epss
scoring_elements 0.37218
published_at 2026-04-21T12:55:00Z
1
value 0.00163
scoring_system epss
scoring_elements 0.37208
published_at 2026-04-01T12:55:00Z
2
value 0.00163
scoring_system epss
scoring_elements 0.37374
published_at 2026-04-02T12:55:00Z
3
value 0.00163
scoring_system epss
scoring_elements 0.374
published_at 2026-04-04T12:55:00Z
4
value 0.00163
scoring_system epss
scoring_elements 0.37228
published_at 2026-04-07T12:55:00Z
5
value 0.00163
scoring_system epss
scoring_elements 0.3728
published_at 2026-04-08T12:55:00Z
6
value 0.00163
scoring_system epss
scoring_elements 0.37293
published_at 2026-04-09T12:55:00Z
7
value 0.00163
scoring_system epss
scoring_elements 0.37304
published_at 2026-04-11T12:55:00Z
8
value 0.00163
scoring_system epss
scoring_elements 0.37271
published_at 2026-04-12T12:55:00Z
9
value 0.00163
scoring_system epss
scoring_elements 0.37243
published_at 2026-04-13T12:55:00Z
10
value 0.00163
scoring_system epss
scoring_elements 0.37289
published_at 2026-04-16T12:55:00Z
11
value 0.00163
scoring_system epss
scoring_elements 0.37272
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-4355
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4355
4
reference_url http://sourceware.org/cgi-bin/cvsweb.cgi/~checkout~/src/gdb/NEWS?content-type=text/x-cvsweb-markup&cvsroot=src
reference_id
reference_type
scores
url http://sourceware.org/cgi-bin/cvsweb.cgi/~checkout~/src/gdb/NEWS?content-type=text/x-cvsweb-markup&cvsroot=src
5
reference_url http://sourceware.org/ml/gdb-patches/2011-04/msg00559.html
reference_id
reference_type
scores
url http://sourceware.org/ml/gdb-patches/2011-04/msg00559.html
6
reference_url http://sourceware.org/ml/gdb-patches/2011-05/msg00202.html
reference_id
reference_type
scores
url http://sourceware.org/ml/gdb-patches/2011-05/msg00202.html
7
reference_url http://www.securitytracker.com/id/1028191
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1028191
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=703238
reference_id 703238
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=703238
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:4.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:4.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:4.18:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:5.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:5.0.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:5.0.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:5.0.92:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:5.0.93:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:5.0.93:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:5.0.93:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:5.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:5.1.1:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:5.2:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:5.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:5.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:5.2.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:5.3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:6.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:6.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:6.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:6.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:6.1.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:6.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:6.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:6.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:6.2.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:6.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:6.4:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:6.5:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:6.6:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:6.7:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:6.7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:6.7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:6.7.1:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:6.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:6.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:6.8:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:7.0:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:7.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:7.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:7.0.1:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:7.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:7.2:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:7.3:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:7.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:7.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:7.3.1:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:7.4:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-4355
reference_id CVE-2011-4355
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-4355
39
reference_url https://access.redhat.com/errata/RHSA-2013:0522
reference_id RHSA-2013:0522
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0522
fixed_packages
0
url pkg:deb/debian/gdb@7.6-1?distro=trixie
purl pkg:deb/debian/gdb@7.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@7.6-1%3Fdistro=trixie
1
url pkg:deb/debian/gdb@10.1-1.7?distro=trixie
purl pkg:deb/debian/gdb@10.1-1.7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@10.1-1.7%3Fdistro=trixie
2
url pkg:deb/debian/gdb@13.1-3?distro=trixie
purl pkg:deb/debian/gdb@13.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@13.1-3%3Fdistro=trixie
3
url pkg:deb/debian/gdb@16.3-1?distro=trixie
purl pkg:deb/debian/gdb@16.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@16.3-1%3Fdistro=trixie
4
url pkg:deb/debian/gdb@17.1-4?distro=trixie
purl pkg:deb/debian/gdb@17.1-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@17.1-4%3Fdistro=trixie
aliases CVE-2011-4355
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e8jh-cbap-87hz
1
url VCID-pgqb-wak8-f3bq
vulnerability_id VCID-pgqb-wak8-f3bq
summary
Multiple vulnerabilities have been discovered in the GNU debugger,
    potentially allowing the execution of arbitrary code.
references
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc
1
reference_url http://bugs.gentoo.org/show_bug.cgi?id=91398
reference_id
reference_type
scores
url http://bugs.gentoo.org/show_bug.cgi?id=91398
2
reference_url http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001060
reference_id
reference_type
scores
url http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001060
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1704.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1704.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-1704
reference_id
reference_type
scores
0
value 0.00222
scoring_system epss
scoring_elements 0.44809
published_at 2026-04-21T12:55:00Z
1
value 0.00222
scoring_system epss
scoring_elements 0.44744
published_at 2026-04-01T12:55:00Z
2
value 0.00222
scoring_system epss
scoring_elements 0.44824
published_at 2026-04-02T12:55:00Z
3
value 0.00222
scoring_system epss
scoring_elements 0.44845
published_at 2026-04-04T12:55:00Z
4
value 0.00222
scoring_system epss
scoring_elements 0.44785
published_at 2026-04-07T12:55:00Z
5
value 0.00222
scoring_system epss
scoring_elements 0.44838
published_at 2026-04-08T12:55:00Z
6
value 0.00222
scoring_system epss
scoring_elements 0.4484
published_at 2026-04-09T12:55:00Z
7
value 0.00222
scoring_system epss
scoring_elements 0.44857
published_at 2026-04-11T12:55:00Z
8
value 0.00222
scoring_system epss
scoring_elements 0.44826
published_at 2026-04-12T12:55:00Z
9
value 0.00222
scoring_system epss
scoring_elements 0.44828
published_at 2026-04-13T12:55:00Z
10
value 0.00222
scoring_system epss
scoring_elements 0.44882
published_at 2026-04-16T12:55:00Z
11
value 0.00222
scoring_system epss
scoring_elements 0.44875
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-1704
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1704
6
reference_url http://secunia.com/advisories/15527
reference_id
reference_type
scores
url http://secunia.com/advisories/15527
7
reference_url http://secunia.com/advisories/17001
reference_id
reference_type
scores
url http://secunia.com/advisories/17001
8
reference_url http://secunia.com/advisories/17072
reference_id
reference_type
scores
url http://secunia.com/advisories/17072
9
reference_url http://secunia.com/advisories/17135
reference_id
reference_type
scores
url http://secunia.com/advisories/17135
10
reference_url http://secunia.com/advisories/17257
reference_id
reference_type
scores
url http://secunia.com/advisories/17257
11
reference_url http://secunia.com/advisories/17356
reference_id
reference_type
scores
url http://secunia.com/advisories/17356
12
reference_url http://secunia.com/advisories/17718
reference_id
reference_type
scores
url http://secunia.com/advisories/17718
13
reference_url http://secunia.com/advisories/18506
reference_id
reference_type
scores
url http://secunia.com/advisories/18506
14
reference_url http://secunia.com/advisories/21122
reference_id
reference_type
scores
url http://secunia.com/advisories/21122
15
reference_url http://secunia.com/advisories/21262
reference_id
reference_type
scores
url http://secunia.com/advisories/21262
16
reference_url http://secunia.com/advisories/21717
reference_id
reference_type
scores
url http://secunia.com/advisories/21717
17
reference_url http://secunia.com/advisories/24788
reference_id
reference_type
scores
url http://secunia.com/advisories/24788
18
reference_url http://security.gentoo.org/glsa/glsa-200505-15.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200505-15.xml
19
reference_url http://securitytracker.com/id?1016544
reference_id
reference_type
scores
url http://securitytracker.com/id?1016544
20
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9071
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9071
21
reference_url http://support.avaya.com/elmodocs2/security/ASA-2005-222.pdf
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2005-222.pdf
22
reference_url http://support.avaya.com/elmodocs2/security/ASA-2006-015.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2006-015.htm
23
reference_url http://support.avaya.com/elmodocs2/security/ASA-2006-178.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2006-178.htm
24
reference_url http://www.gentoo.org/security/en/glsa/glsa-200506-01.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200506-01.xml
25
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:095
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:095
26
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:215
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:215
27
reference_url http://www.osvdb.org/16757
reference_id
reference_type
scores
url http://www.osvdb.org/16757
28
reference_url http://www.redhat.com/support/errata/RHSA-2005-659.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-659.html
29
reference_url http://www.redhat.com/support/errata/RHSA-2005-673.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-673.html
30
reference_url http://www.redhat.com/support/errata/RHSA-2005-709.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-709.html
31
reference_url http://www.redhat.com/support/errata/RHSA-2005-763.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-763.html
32
reference_url http://www.redhat.com/support/errata/RHSA-2005-801.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-801.html
33
reference_url http://www.redhat.com/support/errata/RHSA-2006-0354.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2006-0354.html
34
reference_url http://www.redhat.com/support/errata/RHSA-2006-0368.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2006-0368.html
35
reference_url http://www.securityfocus.com/archive/1/464745/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464745/100/0/threaded
36
reference_url http://www.securityfocus.com/bid/13697
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/13697
37
reference_url http://www.trustix.org/errata/2005/0025/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2005/0025/
38
reference_url http://www.vmware.com/support/vi3/doc/esx-55052-patch.html
reference_id
reference_type
scores
url http://www.vmware.com/support/vi3/doc/esx-55052-patch.html
39
reference_url http://www.vupen.com/english/advisories/2007/1267
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1267
40
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617660
reference_id 1617660
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617660
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:*:r2:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:*:r2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:*:r2:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-1704
reference_id CVE-2005-1704
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-1704
43
reference_url https://security.gentoo.org/glsa/200505-15
reference_id GLSA-200505-15
reference_type
scores
url https://security.gentoo.org/glsa/200505-15
44
reference_url https://security.gentoo.org/glsa/200506-01
reference_id GLSA-200506-01
reference_type
scores
url https://security.gentoo.org/glsa/200506-01
45
reference_url https://access.redhat.com/errata/RHSA-2005:659
reference_id RHSA-2005:659
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:659
46
reference_url https://access.redhat.com/errata/RHSA-2005:673
reference_id RHSA-2005:673
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:673
47
reference_url https://access.redhat.com/errata/RHSA-2005:709
reference_id RHSA-2005:709
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:709
48
reference_url https://access.redhat.com/errata/RHSA-2005:763
reference_id RHSA-2005:763
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:763
49
reference_url https://access.redhat.com/errata/RHSA-2005:801
reference_id RHSA-2005:801
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:801
50
reference_url https://access.redhat.com/errata/RHSA-2006:0354
reference_id RHSA-2006:0354
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0354
51
reference_url https://access.redhat.com/errata/RHSA-2006:0368
reference_id RHSA-2006:0368
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0368
52
reference_url https://usn.ubuntu.com/135-1/
reference_id USN-135-1
reference_type
scores
url https://usn.ubuntu.com/135-1/
53
reference_url https://usn.ubuntu.com/136-1/
reference_id USN-136-1
reference_type
scores
url https://usn.ubuntu.com/136-1/
fixed_packages
0
url pkg:deb/debian/gdb@6.3-6?distro=trixie
purl pkg:deb/debian/gdb@6.3-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@6.3-6%3Fdistro=trixie
1
url pkg:deb/debian/gdb@10.1-1.7?distro=trixie
purl pkg:deb/debian/gdb@10.1-1.7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@10.1-1.7%3Fdistro=trixie
2
url pkg:deb/debian/gdb@13.1-3?distro=trixie
purl pkg:deb/debian/gdb@13.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@13.1-3%3Fdistro=trixie
3
url pkg:deb/debian/gdb@16.3-1?distro=trixie
purl pkg:deb/debian/gdb@16.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@16.3-1%3Fdistro=trixie
4
url pkg:deb/debian/gdb@17.1-4?distro=trixie
purl pkg:deb/debian/gdb@17.1-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@17.1-4%3Fdistro=trixie
aliases CVE-2005-1704
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pgqb-wak8-f3bq
2
url VCID-su62-cqqv-5kbb
vulnerability_id VCID-su62-cqqv-5kbb
summary gdb: Malformed section in an ELF binary or a core file can cause memory exhaustion
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9778.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-9778.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9778
reference_id
reference_type
scores
0
value 0.00298
scoring_system epss
scoring_elements 0.53065
published_at 2026-04-01T12:55:00Z
1
value 0.00298
scoring_system epss
scoring_elements 0.53092
published_at 2026-04-02T12:55:00Z
2
value 0.00298
scoring_system epss
scoring_elements 0.53116
published_at 2026-04-04T12:55:00Z
3
value 0.00298
scoring_system epss
scoring_elements 0.53085
published_at 2026-04-07T12:55:00Z
4
value 0.00298
scoring_system epss
scoring_elements 0.53135
published_at 2026-04-08T12:55:00Z
5
value 0.00298
scoring_system epss
scoring_elements 0.53129
published_at 2026-04-09T12:55:00Z
6
value 0.00298
scoring_system epss
scoring_elements 0.5318
published_at 2026-04-11T12:55:00Z
7
value 0.00298
scoring_system epss
scoring_elements 0.53165
published_at 2026-04-12T12:55:00Z
8
value 0.00298
scoring_system epss
scoring_elements 0.53148
published_at 2026-04-13T12:55:00Z
9
value 0.00298
scoring_system epss
scoring_elements 0.53188
published_at 2026-04-16T12:55:00Z
10
value 0.00298
scoring_system epss
scoring_elements 0.53196
published_at 2026-04-18T12:55:00Z
11
value 0.00298
scoring_system epss
scoring_elements 0.53178
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9778
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9778
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9778
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1466255
reference_id 1466255
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1466255
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865607
reference_id 865607
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865607
fixed_packages
0
url pkg:deb/debian/gdb@8.3.1-1?distro=trixie
purl pkg:deb/debian/gdb@8.3.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@8.3.1-1%3Fdistro=trixie
1
url pkg:deb/debian/gdb@10.1-1.7?distro=trixie
purl pkg:deb/debian/gdb@10.1-1.7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@10.1-1.7%3Fdistro=trixie
2
url pkg:deb/debian/gdb@13.1-3?distro=trixie
purl pkg:deb/debian/gdb@13.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@13.1-3%3Fdistro=trixie
3
url pkg:deb/debian/gdb@16.3-1?distro=trixie
purl pkg:deb/debian/gdb@16.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@16.3-1%3Fdistro=trixie
4
url pkg:deb/debian/gdb@17.1-4?distro=trixie
purl pkg:deb/debian/gdb@17.1-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@17.1-4%3Fdistro=trixie
aliases CVE-2017-9778
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-su62-cqqv-5kbb
3
url VCID-vd29-48zg-3qe9
vulnerability_id VCID-vd29-48zg-3qe9
summary
Multiple vulnerabilities have been discovered in the GNU debugger,
    potentially allowing the execution of arbitrary code.
references
0
reference_url http://bugs.gentoo.org/show_bug.cgi?id=88398
reference_id
reference_type
scores
url http://bugs.gentoo.org/show_bug.cgi?id=88398
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1705.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1705.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-1705
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.17836
published_at 2026-04-21T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.1786
published_at 2026-04-01T12:55:00Z
2
value 0.00057
scoring_system epss
scoring_elements 0.18021
published_at 2026-04-02T12:55:00Z
3
value 0.00057
scoring_system epss
scoring_elements 0.18075
published_at 2026-04-04T12:55:00Z
4
value 0.00057
scoring_system epss
scoring_elements 0.17776
published_at 2026-04-07T12:55:00Z
5
value 0.00057
scoring_system epss
scoring_elements 0.17864
published_at 2026-04-08T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17925
published_at 2026-04-09T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17941
published_at 2026-04-11T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.17896
published_at 2026-04-12T12:55:00Z
9
value 0.00057
scoring_system epss
scoring_elements 0.17847
published_at 2026-04-13T12:55:00Z
10
value 0.00057
scoring_system epss
scoring_elements 0.17789
published_at 2026-04-16T12:55:00Z
11
value 0.00057
scoring_system epss
scoring_elements 0.17799
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-1705
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1705
4
reference_url http://secunia.com/advisories/17072
reference_id
reference_type
scores
url http://secunia.com/advisories/17072
5
reference_url http://secunia.com/advisories/17356
reference_id
reference_type
scores
url http://secunia.com/advisories/17356
6
reference_url http://secunia.com/advisories/18506
reference_id
reference_type
scores
url http://secunia.com/advisories/18506
7
reference_url http://security.gentoo.org/glsa/glsa-200505-15.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200505-15.xml
8
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11072
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11072
9
reference_url http://support.avaya.com/elmodocs2/security/ASA-2006-015.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2006-015.htm
10
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:095
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:095
11
reference_url http://www.redhat.com/support/errata/RHSA-2005-709.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-709.html
12
reference_url http://www.redhat.com/support/errata/RHSA-2005-801.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-801.html
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617661
reference_id 1617661
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617661
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:*:r2:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gdb:*:r2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gdb:*:r2:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-1705
reference_id CVE-2005-1705
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2005-1705
16
reference_url https://security.gentoo.org/glsa/200505-15
reference_id GLSA-200505-15
reference_type
scores
url https://security.gentoo.org/glsa/200505-15
17
reference_url https://access.redhat.com/errata/RHSA-2005:709
reference_id RHSA-2005:709
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:709
18
reference_url https://access.redhat.com/errata/RHSA-2005:801
reference_id RHSA-2005:801
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:801
19
reference_url https://usn.ubuntu.com/135-1/
reference_id USN-135-1
reference_type
scores
url https://usn.ubuntu.com/135-1/
fixed_packages
0
url pkg:deb/debian/gdb@6.3-6?distro=trixie
purl pkg:deb/debian/gdb@6.3-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@6.3-6%3Fdistro=trixie
1
url pkg:deb/debian/gdb@10.1-1.7?distro=trixie
purl pkg:deb/debian/gdb@10.1-1.7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@10.1-1.7%3Fdistro=trixie
2
url pkg:deb/debian/gdb@13.1-3?distro=trixie
purl pkg:deb/debian/gdb@13.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@13.1-3%3Fdistro=trixie
3
url pkg:deb/debian/gdb@16.3-1?distro=trixie
purl pkg:deb/debian/gdb@16.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@16.3-1%3Fdistro=trixie
4
url pkg:deb/debian/gdb@17.1-4?distro=trixie
purl pkg:deb/debian/gdb@17.1-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@17.1-4%3Fdistro=trixie
aliases CVE-2005-1705
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vd29-48zg-3qe9
4
url VCID-xz9w-9fjy-auhb
vulnerability_id VCID-xz9w-9fjy-auhb
summary binutils: buffer overflow in ihex.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9939.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9939.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9939
reference_id
reference_type
scores
0
value 0.00378
scoring_system epss
scoring_elements 0.59395
published_at 2026-04-21T12:55:00Z
1
value 0.00378
scoring_system epss
scoring_elements 0.59414
published_at 2026-04-18T12:55:00Z
2
value 0.00378
scoring_system epss
scoring_elements 0.59263
published_at 2026-04-01T12:55:00Z
3
value 0.00378
scoring_system epss
scoring_elements 0.59337
published_at 2026-04-02T12:55:00Z
4
value 0.00378
scoring_system epss
scoring_elements 0.5936
published_at 2026-04-04T12:55:00Z
5
value 0.00378
scoring_system epss
scoring_elements 0.59326
published_at 2026-04-07T12:55:00Z
6
value 0.00378
scoring_system epss
scoring_elements 0.59377
published_at 2026-04-08T12:55:00Z
7
value 0.00378
scoring_system epss
scoring_elements 0.5939
published_at 2026-04-09T12:55:00Z
8
value 0.00378
scoring_system epss
scoring_elements 0.59409
published_at 2026-04-11T12:55:00Z
9
value 0.00378
scoring_system epss
scoring_elements 0.59393
published_at 2026-04-12T12:55:00Z
10
value 0.00378
scoring_system epss
scoring_elements 0.59375
published_at 2026-04-13T12:55:00Z
11
value 0.00378
scoring_system epss
scoring_elements 0.59407
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9939
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9939
3
reference_url https://sourceware.org/bugzilla/show_bug.cgi?id=18750
reference_id
reference_type
scores
url https://sourceware.org/bugzilla/show_bug.cgi?id=18750
4
reference_url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=7e27a9d5f22f9f7ead11738b1546d0b5c737266b
reference_id
reference_type
scores
url https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=7e27a9d5f22f9f7ead11738b1546d0b5c737266b
5
reference_url http://www.openwall.com/lists/oss-security/2015/07/31/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/07/31/6
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1250129
reference_id 1250129
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1250129
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-9939
reference_id CVE-2014-9939
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2014-9939
9
reference_url https://usn.ubuntu.com/3367-1/
reference_id USN-3367-1
reference_type
scores
url https://usn.ubuntu.com/3367-1/
fixed_packages
0
url pkg:deb/debian/gdb@7.10-1?distro=trixie
purl pkg:deb/debian/gdb@7.10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@7.10-1%3Fdistro=trixie
1
url pkg:deb/debian/gdb@10.1-1.7?distro=trixie
purl pkg:deb/debian/gdb@10.1-1.7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@10.1-1.7%3Fdistro=trixie
2
url pkg:deb/debian/gdb@13.1-3?distro=trixie
purl pkg:deb/debian/gdb@13.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@13.1-3%3Fdistro=trixie
3
url pkg:deb/debian/gdb@16.3-1?distro=trixie
purl pkg:deb/debian/gdb@16.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@16.3-1%3Fdistro=trixie
4
url pkg:deb/debian/gdb@17.1-4?distro=trixie
purl pkg:deb/debian/gdb@17.1-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@17.1-4%3Fdistro=trixie
aliases CVE-2014-9939
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xz9w-9fjy-auhb
5
url VCID-y4ak-gm1q-6fa1
vulnerability_id VCID-y4ak-gm1q-6fa1
summary
VMware guest operating systems might be able to execute arbitrary code with
    elevated privileges on the host operating system through multiple flaws.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4146.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4146.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4146
reference_id
reference_type
scores
0
value 0.01258
scoring_system epss
scoring_elements 0.79348
published_at 2026-04-01T12:55:00Z
1
value 0.01258
scoring_system epss
scoring_elements 0.79354
published_at 2026-04-02T12:55:00Z
2
value 0.01258
scoring_system epss
scoring_elements 0.79377
published_at 2026-04-04T12:55:00Z
3
value 0.01258
scoring_system epss
scoring_elements 0.79363
published_at 2026-04-07T12:55:00Z
4
value 0.01258
scoring_system epss
scoring_elements 0.79389
published_at 2026-04-08T12:55:00Z
5
value 0.01258
scoring_system epss
scoring_elements 0.79399
published_at 2026-04-09T12:55:00Z
6
value 0.01258
scoring_system epss
scoring_elements 0.79422
published_at 2026-04-11T12:55:00Z
7
value 0.01258
scoring_system epss
scoring_elements 0.79406
published_at 2026-04-12T12:55:00Z
8
value 0.01258
scoring_system epss
scoring_elements 0.79395
published_at 2026-04-13T12:55:00Z
9
value 0.01258
scoring_system epss
scoring_elements 0.79426
published_at 2026-04-16T12:55:00Z
10
value 0.01258
scoring_system epss
scoring_elements 0.79424
published_at 2026-04-18T12:55:00Z
11
value 0.01258
scoring_system epss
scoring_elements 0.79427
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4146
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4146
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4146
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=203875
reference_id 203875
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=203875
4
reference_url https://security.gentoo.org/glsa/200711-23
reference_id GLSA-200711-23
reference_type
scores
url https://security.gentoo.org/glsa/200711-23
5
reference_url https://access.redhat.com/errata/RHSA-2007:0229
reference_id RHSA-2007:0229
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0229
6
reference_url https://access.redhat.com/errata/RHSA-2007:0469
reference_id RHSA-2007:0469
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0469
7
reference_url https://usn.ubuntu.com/356-1/
reference_id USN-356-1
reference_type
scores
url https://usn.ubuntu.com/356-1/
fixed_packages
0
url pkg:deb/debian/gdb@7.3-1?distro=trixie
purl pkg:deb/debian/gdb@7.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@7.3-1%3Fdistro=trixie
1
url pkg:deb/debian/gdb@10.1-1.7?distro=trixie
purl pkg:deb/debian/gdb@10.1-1.7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@10.1-1.7%3Fdistro=trixie
2
url pkg:deb/debian/gdb@13.1-3?distro=trixie
purl pkg:deb/debian/gdb@13.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@13.1-3%3Fdistro=trixie
3
url pkg:deb/debian/gdb@16.3-1?distro=trixie
purl pkg:deb/debian/gdb@16.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@16.3-1%3Fdistro=trixie
4
url pkg:deb/debian/gdb@17.1-4?distro=trixie
purl pkg:deb/debian/gdb@17.1-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@17.1-4%3Fdistro=trixie
aliases CVE-2006-4146
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y4ak-gm1q-6fa1
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/gdb@17.1-4%3Fdistro=trixie