Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/gzip@1.13-1?distro=trixie
Typedeb
Namespacedebian
Namegzip
Version1.13-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1q5k-8ctf-hff7
vulnerability_id VCID-1q5k-8ctf-hff7
summary gzexe in the gzip package on Red Hat Linux 5.0 and earlier allows local users to overwrite files of other users via a symlink attack on a temporary file.
references
0
reference_url http://marc.info/?l=bugtraq&m=88603844115233&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=88603844115233&w=2
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-1999-1332
reference_id
reference_type
scores
0
value 0.00155
scoring_system epss
scoring_elements 0.36195
published_at 2026-04-13T12:55:00Z
1
value 0.00155
scoring_system epss
scoring_elements 0.36122
published_at 2026-04-01T12:55:00Z
2
value 0.00155
scoring_system epss
scoring_elements 0.36316
published_at 2026-04-02T12:55:00Z
3
value 0.00155
scoring_system epss
scoring_elements 0.36349
published_at 2026-04-04T12:55:00Z
4
value 0.00155
scoring_system epss
scoring_elements 0.36184
published_at 2026-04-07T12:55:00Z
5
value 0.00155
scoring_system epss
scoring_elements 0.36234
published_at 2026-04-08T12:55:00Z
6
value 0.00155
scoring_system epss
scoring_elements 0.36252
published_at 2026-04-09T12:55:00Z
7
value 0.00155
scoring_system epss
scoring_elements 0.36257
published_at 2026-04-11T12:55:00Z
8
value 0.00155
scoring_system epss
scoring_elements 0.3622
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-1999-1332
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1332
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1332
3
reference_url http://www.debian.org/security/2003/dsa-308
reference_id
reference_type
scores
url http://www.debian.org/security/2003/dsa-308
4
reference_url http://www.iss.net/security_center/static/7241.php
reference_id
reference_type
scores
url http://www.iss.net/security_center/static/7241.php
5
reference_url http://www.osvdb.org/3812
reference_id
reference_type
scores
url http://www.osvdb.org/3812
6
reference_url http://www.redhat.com/support/errata/rh50-errata-general.html#gzip
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/rh50-errata-general.html#gzip
7
reference_url http://www.securityfocus.com/bid/7845
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/7845
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-1999-1332
reference_id CVE-1999-1332
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-1999-1332
fixed_packages
0
url pkg:deb/debian/gzip@1.3.5-6?distro=trixie
purl pkg:deb/debian/gzip@1.3.5-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-6%3Fdistro=trixie
1
url pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/gzip@1.12-1?distro=trixie
purl pkg:deb/debian/gzip@1.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie
3
url pkg:deb/debian/gzip@1.13-1?distro=trixie
purl pkg:deb/debian/gzip@1.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie
aliases CVE-1999-1332
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1q5k-8ctf-hff7
1
url VCID-1yf3-td2x-xffn
vulnerability_id VCID-1yf3-td2x-xffn
summary
This GLSA contains notification of vulnerabilities found in several
    Gentoo packages which have been fixed prior to January 1, 2011. The worst
    of these vulnerabilities could lead to local privilege escalation and
    remote code execution. Please see the package list and CVE identifiers
    below for more information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2624.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2624.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-2624
reference_id
reference_type
scores
0
value 0.07318
scoring_system epss
scoring_elements 0.91645
published_at 2026-04-01T12:55:00Z
1
value 0.07318
scoring_system epss
scoring_elements 0.91653
published_at 2026-04-02T12:55:00Z
2
value 0.07318
scoring_system epss
scoring_elements 0.91658
published_at 2026-04-04T12:55:00Z
3
value 0.07318
scoring_system epss
scoring_elements 0.91667
published_at 2026-04-07T12:55:00Z
4
value 0.07318
scoring_system epss
scoring_elements 0.9168
published_at 2026-04-08T12:55:00Z
5
value 0.07318
scoring_system epss
scoring_elements 0.91686
published_at 2026-04-09T12:55:00Z
6
value 0.07318
scoring_system epss
scoring_elements 0.9169
published_at 2026-04-11T12:55:00Z
7
value 0.07318
scoring_system epss
scoring_elements 0.91691
published_at 2026-04-12T12:55:00Z
8
value 0.07318
scoring_system epss
scoring_elements 0.91688
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-2624
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2624
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507263
reference_id 507263
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507263
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=514711
reference_id 514711
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=514711
5
reference_url https://security.gentoo.org/glsa/201412-08
reference_id GLSA-201412-08
reference_type
scores
url https://security.gentoo.org/glsa/201412-08
6
reference_url https://usn.ubuntu.com/889-1/
reference_id USN-889-1
reference_type
scores
url https://usn.ubuntu.com/889-1/
fixed_packages
0
url pkg:deb/debian/gzip@1.3.12-8?distro=trixie
purl pkg:deb/debian/gzip@1.3.12-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.12-8%3Fdistro=trixie
1
url pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/gzip@1.12-1?distro=trixie
purl pkg:deb/debian/gzip@1.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie
3
url pkg:deb/debian/gzip@1.13-1?distro=trixie
purl pkg:deb/debian/gzip@1.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie
aliases CVE-2009-2624
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1yf3-td2x-xffn
2
url VCID-3adf-qttu-3kfd
vulnerability_id VCID-3adf-qttu-3kfd
summary A vulnerability has been discovered in GNU Gzip and XZ Utils' grep helpers which could result in writes to arbitrary files.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1271.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1271.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-1271
reference_id
reference_type
scores
0
value 0.00813
scoring_system epss
scoring_elements 0.74254
published_at 2026-04-13T12:55:00Z
1
value 0.00813
scoring_system epss
scoring_elements 0.74207
published_at 2026-04-01T12:55:00Z
2
value 0.00813
scoring_system epss
scoring_elements 0.74213
published_at 2026-04-02T12:55:00Z
3
value 0.00813
scoring_system epss
scoring_elements 0.7424
published_at 2026-04-04T12:55:00Z
4
value 0.00813
scoring_system epss
scoring_elements 0.74212
published_at 2026-04-07T12:55:00Z
5
value 0.00813
scoring_system epss
scoring_elements 0.74245
published_at 2026-04-08T12:55:00Z
6
value 0.00813
scoring_system epss
scoring_elements 0.74259
published_at 2026-04-09T12:55:00Z
7
value 0.00813
scoring_system epss
scoring_elements 0.74281
published_at 2026-04-11T12:55:00Z
8
value 0.00813
scoring_system epss
scoring_elements 0.74261
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-1271
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009167
reference_id 1009167
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009167
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009168
reference_id 1009168
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009168
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2073310
reference_id 2073310
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2073310
7
reference_url https://www.openwall.com/lists/oss-security/2022/04/07/8
reference_id 8
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://www.openwall.com/lists/oss-security/2022/04/07/8
8
reference_url https://security.archlinux.org/ASA-202204-7
reference_id ASA-202204-7
reference_type
scores
url https://security.archlinux.org/ASA-202204-7
9
reference_url https://security.archlinux.org/ASA-202204-8
reference_id ASA-202204-8
reference_type
scores
url https://security.archlinux.org/ASA-202204-8
10
reference_url https://security.archlinux.org/AVG-2665
reference_id AVG-2665
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2665
11
reference_url https://security.archlinux.org/AVG-2666
reference_id AVG-2666
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2666
12
reference_url https://access.redhat.com/security/cve/CVE-2022-1271
reference_id CVE-2022-1271
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://access.redhat.com/security/cve/CVE-2022-1271
13
reference_url https://security-tracker.debian.org/tracker/CVE-2022-1271
reference_id CVE-2022-1271
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://security-tracker.debian.org/tracker/CVE-2022-1271
14
reference_url https://security.gentoo.org/glsa/202209-01
reference_id GLSA-202209-01
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://security.gentoo.org/glsa/202209-01
15
reference_url https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
reference_id msg00011.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html
16
reference_url https://security.netapp.com/advisory/ntap-20220930-0006/
reference_id ntap-20220930-0006
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://security.netapp.com/advisory/ntap-20220930-0006/
17
reference_url https://git.tukaani.org/?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6
reference_id ?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://git.tukaani.org/?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6
18
reference_url https://access.redhat.com/errata/RHSA-2022:1537
reference_id RHSA-2022:1537
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1537
19
reference_url https://access.redhat.com/errata/RHSA-2022:1592
reference_id RHSA-2022:1592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1592
20
reference_url https://access.redhat.com/errata/RHSA-2022:1665
reference_id RHSA-2022:1665
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1665
21
reference_url https://access.redhat.com/errata/RHSA-2022:1676
reference_id RHSA-2022:1676
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1676
22
reference_url https://access.redhat.com/errata/RHSA-2022:2191
reference_id RHSA-2022:2191
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2191
23
reference_url https://access.redhat.com/errata/RHSA-2022:4582
reference_id RHSA-2022:4582
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4582
24
reference_url https://access.redhat.com/errata/RHSA-2022:4896
reference_id RHSA-2022:4896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4896
25
reference_url https://access.redhat.com/errata/RHSA-2022:4940
reference_id RHSA-2022:4940
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4940
26
reference_url https://access.redhat.com/errata/RHSA-2022:4991
reference_id RHSA-2022:4991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4991
27
reference_url https://access.redhat.com/errata/RHSA-2022:4992
reference_id RHSA-2022:4992
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4992
28
reference_url https://access.redhat.com/errata/RHSA-2022:4993
reference_id RHSA-2022:4993
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4993
29
reference_url https://access.redhat.com/errata/RHSA-2022:4994
reference_id RHSA-2022:4994
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4994
30
reference_url https://access.redhat.com/errata/RHSA-2022:5052
reference_id RHSA-2022:5052
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5052
31
reference_url https://access.redhat.com/errata/RHSA-2022:5439
reference_id RHSA-2022:5439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5439
32
reference_url https://usn.ubuntu.com/5378-1/
reference_id USN-5378-1
reference_type
scores
url https://usn.ubuntu.com/5378-1/
33
reference_url https://usn.ubuntu.com/5378-2/
reference_id USN-5378-2
reference_type
scores
url https://usn.ubuntu.com/5378-2/
34
reference_url https://usn.ubuntu.com/5378-3/
reference_id USN-5378-3
reference_type
scores
url https://usn.ubuntu.com/5378-3/
35
reference_url https://usn.ubuntu.com/5378-4/
reference_id USN-5378-4
reference_type
scores
url https://usn.ubuntu.com/5378-4/
36
reference_url https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch
reference_id xzgrep-ZDI-CAN-16587.patch
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/
url https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch
fixed_packages
0
url pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/gzip@1.12-1?distro=trixie
purl pkg:deb/debian/gzip@1.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie
2
url pkg:deb/debian/gzip@1.13-1?distro=trixie
purl pkg:deb/debian/gzip@1.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie
aliases CVE-2022-1271
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3adf-qttu-3kfd
3
url VCID-73ee-qa4t-gqd7
vulnerability_id VCID-73ee-qa4t-gqd7
summary
gzip is affected by multiple vulnerabilities, including buffer overflows
    and infinite loops, possibly allowing the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4334.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4334.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4334
reference_id
reference_type
scores
0
value 0.09059
scoring_system epss
scoring_elements 0.92644
published_at 2026-04-13T12:55:00Z
1
value 0.10427
scoring_system epss
scoring_elements 0.93205
published_at 2026-04-02T12:55:00Z
2
value 0.10427
scoring_system epss
scoring_elements 0.93209
published_at 2026-04-04T12:55:00Z
3
value 0.10427
scoring_system epss
scoring_elements 0.93206
published_at 2026-04-07T12:55:00Z
4
value 0.10427
scoring_system epss
scoring_elements 0.93196
published_at 2026-04-01T12:55:00Z
5
value 0.10427
scoring_system epss
scoring_elements 0.93219
published_at 2026-04-09T12:55:00Z
6
value 0.10427
scoring_system epss
scoring_elements 0.93223
published_at 2026-04-11T12:55:00Z
7
value 0.10427
scoring_system epss
scoring_elements 0.93215
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4334
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4334
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4334
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618181
reference_id 1618181
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618181
4
reference_url https://security.gentoo.org/glsa/200609-13
reference_id GLSA-200609-13
reference_type
scores
url https://security.gentoo.org/glsa/200609-13
5
reference_url https://access.redhat.com/errata/RHSA-2006:0667
reference_id RHSA-2006:0667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0667
6
reference_url https://usn.ubuntu.com/349-1/
reference_id USN-349-1
reference_type
scores
url https://usn.ubuntu.com/349-1/
fixed_packages
0
url pkg:deb/debian/gzip@1.3.5-15?distro=trixie
purl pkg:deb/debian/gzip@1.3.5-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-15%3Fdistro=trixie
1
url pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/gzip@1.12-1?distro=trixie
purl pkg:deb/debian/gzip@1.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie
3
url pkg:deb/debian/gzip@1.13-1?distro=trixie
purl pkg:deb/debian/gzip@1.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie
aliases CVE-2006-4334
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-73ee-qa4t-gqd7
4
url VCID-ensg-v8ut-4kh9
vulnerability_id VCID-ensg-v8ut-4kh9
summary
gzip is affected by multiple vulnerabilities, including buffer overflows
    and infinite loops, possibly allowing the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4337.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4337.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4337
reference_id
reference_type
scores
0
value 0.02365
scoring_system epss
scoring_elements 0.84868
published_at 2026-04-01T12:55:00Z
1
value 0.02365
scoring_system epss
scoring_elements 0.84883
published_at 2026-04-02T12:55:00Z
2
value 0.02365
scoring_system epss
scoring_elements 0.84901
published_at 2026-04-04T12:55:00Z
3
value 0.02365
scoring_system epss
scoring_elements 0.84905
published_at 2026-04-07T12:55:00Z
4
value 0.02365
scoring_system epss
scoring_elements 0.84928
published_at 2026-04-08T12:55:00Z
5
value 0.02365
scoring_system epss
scoring_elements 0.84935
published_at 2026-04-09T12:55:00Z
6
value 0.02365
scoring_system epss
scoring_elements 0.84951
published_at 2026-04-11T12:55:00Z
7
value 0.10293
scoring_system epss
scoring_elements 0.9317
published_at 2026-04-12T12:55:00Z
8
value 0.10293
scoring_system epss
scoring_elements 0.93172
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4337
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4337
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4337
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=220595
reference_id 220595
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=220595
4
reference_url https://security.gentoo.org/glsa/200609-13
reference_id GLSA-200609-13
reference_type
scores
url https://security.gentoo.org/glsa/200609-13
5
reference_url https://security.gentoo.org/glsa/200611-24
reference_id GLSA-200611-24
reference_type
scores
url https://security.gentoo.org/glsa/200611-24
6
reference_url https://access.redhat.com/errata/RHSA-2006:0667
reference_id RHSA-2006:0667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0667
7
reference_url https://usn.ubuntu.com/349-1/
reference_id USN-349-1
reference_type
scores
url https://usn.ubuntu.com/349-1/
fixed_packages
0
url pkg:deb/debian/gzip@1.3.5-15?distro=trixie
purl pkg:deb/debian/gzip@1.3.5-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-15%3Fdistro=trixie
1
url pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/gzip@1.12-1?distro=trixie
purl pkg:deb/debian/gzip@1.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie
3
url pkg:deb/debian/gzip@1.13-1?distro=trixie
purl pkg:deb/debian/gzip@1.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie
aliases CVE-2006-4337
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ensg-v8ut-4kh9
5
url VCID-ggpy-kzh6-dkbh
vulnerability_id VCID-ggpy-kzh6-dkbh
summary security flaw
references
0
reference_url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt
1
reference_url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305255
reference_id
reference_type
scores
url http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305255
2
reference_url http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html
3
reference_url http://marc.info/?l=bugtraq&m=111402732406477&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=111402732406477&w=2
4
reference_url http://rhn.redhat.com/errata/RHSA-2005-357.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2005-357.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1228.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1228.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-1228
reference_id
reference_type
scores
0
value 0.04585
scoring_system epss
scoring_elements 0.89225
published_at 2026-04-13T12:55:00Z
1
value 0.04585
scoring_system epss
scoring_elements 0.89177
published_at 2026-04-01T12:55:00Z
2
value 0.04585
scoring_system epss
scoring_elements 0.89183
published_at 2026-04-02T12:55:00Z
3
value 0.04585
scoring_system epss
scoring_elements 0.89198
published_at 2026-04-04T12:55:00Z
4
value 0.04585
scoring_system epss
scoring_elements 0.892
published_at 2026-04-07T12:55:00Z
5
value 0.04585
scoring_system epss
scoring_elements 0.89218
published_at 2026-04-08T12:55:00Z
6
value 0.04585
scoring_system epss
scoring_elements 0.89223
published_at 2026-04-09T12:55:00Z
7
value 0.04585
scoring_system epss
scoring_elements 0.89232
published_at 2026-04-11T12:55:00Z
8
value 0.04585
scoring_system epss
scoring_elements 0.89229
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-1228
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1228
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1228
8
reference_url http://secunia.com/advisories/15047
reference_id
reference_type
scores
url http://secunia.com/advisories/15047
9
reference_url http://secunia.com/advisories/18100
reference_id
reference_type
scores
url http://secunia.com/advisories/18100
10
reference_url http://secunia.com/advisories/21253
reference_id
reference_type
scores
url http://secunia.com/advisories/21253
11
reference_url http://secunia.com/advisories/22033
reference_id
reference_type
scores
url http://secunia.com/advisories/22033
12
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/20199
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/20199
13
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852
14
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11057
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11057
15
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A170
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A170
16
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A382
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A382
17
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1
18
reference_url http://www.debian.org/security/2005/dsa-752
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-752
19
reference_url http://www.osvdb.org/15721
reference_id
reference_type
scores
url http://www.osvdb.org/15721
20
reference_url http://www.securityfocus.com/bid/19289
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/19289
21
reference_url http://www.us-cert.gov/cas/techalerts/TA06-214A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA06-214A.html
22
reference_url http://www.vupen.com/english/advisories/2006/3101
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/3101
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617616
reference_id 1617616
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617616
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-1228
reference_id CVE-2005-1228
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2005-1228
27
reference_url https://access.redhat.com/errata/RHSA-2005:357
reference_id RHSA-2005:357
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:357
28
reference_url https://usn.ubuntu.com/116-1/
reference_id USN-116-1
reference_type
scores
url https://usn.ubuntu.com/116-1/
fixed_packages
0
url pkg:deb/debian/gzip@1.3.5-10?distro=trixie
purl pkg:deb/debian/gzip@1.3.5-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-10%3Fdistro=trixie
1
url pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/gzip@1.12-1?distro=trixie
purl pkg:deb/debian/gzip@1.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie
3
url pkg:deb/debian/gzip@1.13-1?distro=trixie
purl pkg:deb/debian/gzip@1.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie
aliases CVE-2005-1228
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ggpy-kzh6-dkbh
6
url VCID-hn43-p68p-g3d7
vulnerability_id VCID-hn43-p68p-g3d7
summary The (1) gzexe, (2) zdiff, and (3) znew scripts in the gzip package, as used by other packages such as ncompress, allows local users to overwrite files via a symlink attack on temporary files. NOTE: the znew vulnerability may overlap CVE-2003-0367.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0970
reference_id
reference_type
scores
0
value 0.00098
scoring_system epss
scoring_elements 0.26987
published_at 2026-04-13T12:55:00Z
1
value 0.00098
scoring_system epss
scoring_elements 0.27102
published_at 2026-04-01T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.27143
published_at 2026-04-02T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.27179
published_at 2026-04-04T12:55:00Z
4
value 0.00098
scoring_system epss
scoring_elements 0.26971
published_at 2026-04-07T12:55:00Z
5
value 0.00098
scoring_system epss
scoring_elements 0.2704
published_at 2026-04-08T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.27085
published_at 2026-04-09T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.27088
published_at 2026-04-11T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.27044
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0970
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0970
2
reference_url http://secunia.com/advisories/13131
reference_id
reference_type
scores
url http://secunia.com/advisories/13131
3
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/17583
4
reference_url http://www.debian.org/security/2004/dsa-588
reference_id
reference_type
scores
url http://www.debian.org/security/2004/dsa-588
5
reference_url http://www.securityfocus.com/bid/11288
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/11288
6
reference_url http://www.trustix.org/errata/2004/0050
reference_id
reference_type
scores
url http://www.trustix.org/errata/2004/0050
7
reference_url http://www.zataz.net/adviso/ncompress-09052005.txt
reference_id
reference_type
scores
url http://www.zataz.net/adviso/ncompress-09052005.txt
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=257314
reference_id 257314
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=257314
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2004-0970
reference_id CVE-2004-0970
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2004-0970
fixed_packages
0
url pkg:deb/debian/gzip@1.3.5-8?distro=trixie
purl pkg:deb/debian/gzip@1.3.5-8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-8%3Fdistro=trixie
1
url pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/gzip@1.12-1?distro=trixie
purl pkg:deb/debian/gzip@1.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie
3
url pkg:deb/debian/gzip@1.13-1?distro=trixie
purl pkg:deb/debian/gzip@1.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie
aliases CVE-2004-0970
risk_score 0.9
exploitability 0.5
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hn43-p68p-g3d7
7
url VCID-ja6m-7d3c-k3cc
vulnerability_id VCID-ja6m-7d3c-k3cc
summary gzip before 1.3 in Solaris 8, when called with the -f or -force flags, will change the permissions of files that are hard linked to the target files, which allows local users to view or modify these files.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-1349
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21469
published_at 2026-04-01T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21639
published_at 2026-04-02T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21696
published_at 2026-04-04T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.2145
published_at 2026-04-07T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21527
published_at 2026-04-08T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21585
published_at 2026-04-09T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21597
published_at 2026-04-11T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21559
published_at 2026-04-12T12:55:00Z
8
value 0.0007
scoring_system epss
scoring_elements 0.21502
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-1349
fixed_packages
0
url pkg:deb/debian/gzip@0?distro=trixie
purl pkg:deb/debian/gzip@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@0%3Fdistro=trixie
1
url pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/gzip@1.12-1?distro=trixie
purl pkg:deb/debian/gzip@1.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie
3
url pkg:deb/debian/gzip@1.13-1?distro=trixie
purl pkg:deb/debian/gzip@1.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie
aliases CVE-2004-1349
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ja6m-7d3c-k3cc
8
url VCID-px24-9c2r-73cn
vulnerability_id VCID-px24-9c2r-73cn
summary
gzip is affected by multiple vulnerabilities, including buffer overflows
    and infinite loops, possibly allowing the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4338.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4338.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4338
reference_id
reference_type
scores
0
value 0.03744
scoring_system epss
scoring_elements 0.87957
published_at 2026-04-01T12:55:00Z
1
value 0.03744
scoring_system epss
scoring_elements 0.87968
published_at 2026-04-02T12:55:00Z
2
value 0.03744
scoring_system epss
scoring_elements 0.87982
published_at 2026-04-04T12:55:00Z
3
value 0.03744
scoring_system epss
scoring_elements 0.87986
published_at 2026-04-07T12:55:00Z
4
value 0.03744
scoring_system epss
scoring_elements 0.88006
published_at 2026-04-08T12:55:00Z
5
value 0.03744
scoring_system epss
scoring_elements 0.88013
published_at 2026-04-09T12:55:00Z
6
value 0.03744
scoring_system epss
scoring_elements 0.88023
published_at 2026-04-11T12:55:00Z
7
value 0.04679
scoring_system epss
scoring_elements 0.89339
published_at 2026-04-12T12:55:00Z
8
value 0.04679
scoring_system epss
scoring_elements 0.89336
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4338
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4338
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4338
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618182
reference_id 1618182
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618182
4
reference_url https://security.gentoo.org/glsa/200609-13
reference_id GLSA-200609-13
reference_type
scores
url https://security.gentoo.org/glsa/200609-13
5
reference_url https://security.gentoo.org/glsa/200611-24
reference_id GLSA-200611-24
reference_type
scores
url https://security.gentoo.org/glsa/200611-24
6
reference_url https://access.redhat.com/errata/RHSA-2006:0667
reference_id RHSA-2006:0667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0667
7
reference_url https://usn.ubuntu.com/349-1/
reference_id USN-349-1
reference_type
scores
url https://usn.ubuntu.com/349-1/
fixed_packages
0
url pkg:deb/debian/gzip@1.3.5-15?distro=trixie
purl pkg:deb/debian/gzip@1.3.5-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-15%3Fdistro=trixie
1
url pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/gzip@1.12-1?distro=trixie
purl pkg:deb/debian/gzip@1.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie
3
url pkg:deb/debian/gzip@1.13-1?distro=trixie
purl pkg:deb/debian/gzip@1.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie
aliases CVE-2006-4338
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-px24-9c2r-73cn
9
url VCID-uf6e-fsw6-bbbv
vulnerability_id VCID-uf6e-fsw6-bbbv
summary security flaw
references
0
reference_url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt
1
reference_url ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc
2
reference_url http://bugs.gentoo.org/show_bug.cgi?id=90626
reference_id
reference_type
scores
url http://bugs.gentoo.org/show_bug.cgi?id=90626
3
reference_url http://docs.info.apple.com/article.html?artnum=306172
reference_id
reference_type
scores
url http://docs.info.apple.com/article.html?artnum=306172
4
reference_url http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2005-357.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2005-357.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0758.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0758.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-0758
reference_id
reference_type
scores
0
value 0.0015
scoring_system epss
scoring_elements 0.35615
published_at 2026-04-04T12:55:00Z
1
value 0.0015
scoring_system epss
scoring_elements 0.3539
published_at 2026-04-01T12:55:00Z
2
value 0.0015
scoring_system epss
scoring_elements 0.3559
published_at 2026-04-02T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.40416
published_at 2026-04-09T12:55:00Z
4
value 0.00186
scoring_system epss
scoring_elements 0.40437
published_at 2026-04-11T12:55:00Z
5
value 0.00186
scoring_system epss
scoring_elements 0.40399
published_at 2026-04-12T12:55:00Z
6
value 0.00186
scoring_system epss
scoring_elements 0.4038
published_at 2026-04-13T12:55:00Z
7
value 0.00186
scoring_system epss
scoring_elements 0.40354
published_at 2026-04-07T12:55:00Z
8
value 0.00186
scoring_system epss
scoring_elements 0.40405
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-0758
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0758
9
reference_url http://secunia.com/advisories/18100
reference_id
reference_type
scores
url http://secunia.com/advisories/18100
10
reference_url http://secunia.com/advisories/19183
reference_id
reference_type
scores
url http://secunia.com/advisories/19183
11
reference_url http://secunia.com/advisories/22033
reference_id
reference_type
scores
url http://secunia.com/advisories/22033
12
reference_url http://secunia.com/advisories/26235
reference_id
reference_type
scores
url http://secunia.com/advisories/26235
13
reference_url http://securitytracker.com/id?1013928
reference_id
reference_type
scores
url http://securitytracker.com/id?1013928
14
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/20539
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/20539
15
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852
16
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1081
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1081
17
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1107
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1107
18
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9797
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9797
19
reference_url http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_158801__Updated_bzip2_packages_fix_security_issues.html
reference_id
reference_type
scores
url http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_158801__Updated_bzip2_packages_fix_security_issues.html
20
reference_url http://www.gentoo.org/security/en/glsa/glsa-200505-05.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200505-05.xml
21
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:026
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:026
22
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:027
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:027
23
reference_url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.002.html
reference_id
reference_type
scores
url http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.002.html
24
reference_url http://www.osvdb.org/16371
reference_id
reference_type
scores
url http://www.osvdb.org/16371
25
reference_url http://www.redhat.com/support/errata/RHSA-2005-474.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-474.html
26
reference_url http://www.securityfocus.com/bid/13582
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/13582
27
reference_url http://www.securityfocus.com/bid/25159
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/25159
28
reference_url http://www.ubuntu.com/usn/usn-158-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-158-1
29
reference_url http://www.vupen.com/english/advisories/2007/2732
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/2732
30
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617573
reference_id 1617573
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617573
31
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=321286
reference_id 321286
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=321286
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gzip:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-0758
reference_id CVE-2005-0758
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-0758
36
reference_url https://access.redhat.com/errata/RHSA-2005:357
reference_id RHSA-2005:357
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:357
37
reference_url https://access.redhat.com/errata/RHSA-2005:474
reference_id RHSA-2005:474
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:474
38
reference_url https://usn.ubuntu.com/158-1/
reference_id USN-158-1
reference_type
scores
url https://usn.ubuntu.com/158-1/
39
reference_url https://usn.ubuntu.com/161-1/
reference_id USN-161-1
reference_type
scores
url https://usn.ubuntu.com/161-1/
fixed_packages
0
url pkg:deb/debian/gzip@1.3.5-10?distro=trixie
purl pkg:deb/debian/gzip@1.3.5-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-10%3Fdistro=trixie
1
url pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/gzip@1.12-1?distro=trixie
purl pkg:deb/debian/gzip@1.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie
3
url pkg:deb/debian/gzip@1.13-1?distro=trixie
purl pkg:deb/debian/gzip@1.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie
aliases CVE-2005-0758
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uf6e-fsw6-bbbv
10
url VCID-vj3y-4hqq-xybm
vulnerability_id VCID-vj3y-4hqq-xybm
summary security flaw
references
0
reference_url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt
1
reference_url http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html
2
reference_url http://rhn.redhat.com/errata/RHSA-2005-357.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2005-357.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0988.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0988.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-0988
reference_id
reference_type
scores
0
value 0.00115
scoring_system epss
scoring_elements 0.301
published_at 2026-04-13T12:55:00Z
1
value 0.00115
scoring_system epss
scoring_elements 0.30198
published_at 2026-04-01T12:55:00Z
2
value 0.00115
scoring_system epss
scoring_elements 0.30228
published_at 2026-04-02T12:55:00Z
3
value 0.00115
scoring_system epss
scoring_elements 0.30277
published_at 2026-04-04T12:55:00Z
4
value 0.00115
scoring_system epss
scoring_elements 0.30095
published_at 2026-04-07T12:55:00Z
5
value 0.00115
scoring_system epss
scoring_elements 0.30155
published_at 2026-04-08T12:55:00Z
6
value 0.00115
scoring_system epss
scoring_elements 0.30191
published_at 2026-04-09T12:55:00Z
7
value 0.00115
scoring_system epss
scoring_elements 0.30193
published_at 2026-04-11T12:55:00Z
8
value 0.00115
scoring_system epss
scoring_elements 0.3015
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-0988
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0988
6
reference_url http://secunia.com/advisories/18100
reference_id
reference_type
scores
url http://secunia.com/advisories/18100
7
reference_url http://secunia.com/advisories/21253
reference_id
reference_type
scores
url http://secunia.com/advisories/21253
8
reference_url http://secunia.com/advisories/22033
reference_id
reference_type
scores
url http://secunia.com/advisories/22033
9
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852
10
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242
11
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169
12
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765
13
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1
14
reference_url http://www.debian.org/security/2005/dsa-752
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-752
15
reference_url http://www.osvdb.org/15487
reference_id
reference_type
scores
url http://www.osvdb.org/15487
16
reference_url http://www.securityfocus.com/archive/1/394965
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/394965
17
reference_url http://www.securityfocus.com/bid/12996
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/12996
18
reference_url http://www.securityfocus.com/bid/19289
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/19289
19
reference_url http://www.us-cert.gov/cas/techalerts/TA06-214A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA06-214A.html
20
reference_url http://www.vupen.com/english/advisories/2006/3101
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/3101
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617595
reference_id 1617595
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617595
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.0:releng:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.0:releng:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.0:releng:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.10:release:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.10:release:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.10:release:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.10:release_p8:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.10:release_p8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.10:release_p8:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.10:releng:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.10:releng:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.10:releng:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.1.1:release:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.1.1:release:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.1.1:release:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.11:release_p3:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.11:release_p3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.11:release_p3:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.11:releng:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.11:releng:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.11:releng:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.11:stable:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.11:stable:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.11:stable:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.2:stable:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.2:stable:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.2:stable:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:release:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.3:release:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:release:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:release_p38:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.3:release_p38:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:release_p38:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:releng:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.3:releng:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:releng:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:stable:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.3:stable:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:stable:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:stable:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.6:stable:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:stable:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:release:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.7:release:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:release:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:stable:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.7:stable:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:stable:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.8:pre-release:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.8:pre-release:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.8:pre-release:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.8:release_p6:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.8:release_p6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.8:release_p6:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.9:pre-release:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.9:pre-release:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.9:pre-release:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.9:releng:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:4.9:releng:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.9:releng:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:alpha:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:5.1:alpha:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:alpha:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.2.1:releng:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:5.2.1:releng:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.2.1:releng:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*
reference_id cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*
reference_id cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*
reference_id cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-0988
reference_id CVE-2005-0988
reference_type
scores
0
value 3.7
scoring_system cvssv2
scoring_elements AV:L/AC:H/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-0988
127
reference_url https://access.redhat.com/errata/RHSA-2005:357
reference_id RHSA-2005:357
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:357
128
reference_url https://usn.ubuntu.com/116-1/
reference_id USN-116-1
reference_type
scores
url https://usn.ubuntu.com/116-1/
fixed_packages
0
url pkg:deb/debian/gzip@1.3.5-10?distro=trixie
purl pkg:deb/debian/gzip@1.3.5-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-10%3Fdistro=trixie
1
url pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/gzip@1.12-1?distro=trixie
purl pkg:deb/debian/gzip@1.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie
3
url pkg:deb/debian/gzip@1.13-1?distro=trixie
purl pkg:deb/debian/gzip@1.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie
aliases CVE-2005-0988
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vj3y-4hqq-xybm
11
url VCID-vm8g-v83d-mbfm
vulnerability_id VCID-vm8g-v83d-mbfm
summary
This GLSA contains notification of vulnerabilities found in several
    Gentoo packages which have been fixed prior to January 1, 2011. The worst
    of these vulnerabilities could lead to local privilege escalation and
    remote code execution. Please see the package list and CVE identifiers
    below for more information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0001.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0001.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0001
reference_id
reference_type
scores
0
value 0.22601
scoring_system epss
scoring_elements 0.95813
published_at 2026-04-01T12:55:00Z
1
value 0.22601
scoring_system epss
scoring_elements 0.95822
published_at 2026-04-02T12:55:00Z
2
value 0.22601
scoring_system epss
scoring_elements 0.9583
published_at 2026-04-04T12:55:00Z
3
value 0.22601
scoring_system epss
scoring_elements 0.95832
published_at 2026-04-07T12:55:00Z
4
value 0.22601
scoring_system epss
scoring_elements 0.95841
published_at 2026-04-08T12:55:00Z
5
value 0.22601
scoring_system epss
scoring_elements 0.95845
published_at 2026-04-09T12:55:00Z
6
value 0.22601
scoring_system epss
scoring_elements 0.95848
published_at 2026-04-12T12:55:00Z
7
value 0.22601
scoring_system epss
scoring_elements 0.95849
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0001
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0001
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=554418
reference_id 554418
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=554418
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=566002
reference_id 566002
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=566002
5
reference_url https://security.gentoo.org/glsa/201412-08
reference_id GLSA-201412-08
reference_type
scores
url https://security.gentoo.org/glsa/201412-08
6
reference_url https://access.redhat.com/errata/RHSA-2010:0061
reference_id RHSA-2010:0061
reference_type
scores
url https://access.redhat.com/errata/RHSA-2010:0061
7
reference_url https://usn.ubuntu.com/889-1/
reference_id USN-889-1
reference_type
scores
url https://usn.ubuntu.com/889-1/
fixed_packages
0
url pkg:deb/debian/gzip@1.3.12-9?distro=trixie
purl pkg:deb/debian/gzip@1.3.12-9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.12-9%3Fdistro=trixie
1
url pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/gzip@1.12-1?distro=trixie
purl pkg:deb/debian/gzip@1.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie
3
url pkg:deb/debian/gzip@1.13-1?distro=trixie
purl pkg:deb/debian/gzip@1.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie
aliases CVE-2010-0001
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vm8g-v83d-mbfm
12
url VCID-w9ut-ky8t-sqar
vulnerability_id VCID-w9ut-ky8t-sqar
summary gzip: symlink attack on temporary files leads to arbitrary file overwrite
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0367.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0367.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0367
reference_id
reference_type
scores
0
value 0.00141
scoring_system epss
scoring_elements 0.33986
published_at 2026-04-01T12:55:00Z
1
value 0.00141
scoring_system epss
scoring_elements 0.34325
published_at 2026-04-02T12:55:00Z
2
value 0.00141
scoring_system epss
scoring_elements 0.34353
published_at 2026-04-04T12:55:00Z
3
value 0.00141
scoring_system epss
scoring_elements 0.34218
published_at 2026-04-07T12:55:00Z
4
value 0.00141
scoring_system epss
scoring_elements 0.34261
published_at 2026-04-08T12:55:00Z
5
value 0.00141
scoring_system epss
scoring_elements 0.34291
published_at 2026-04-11T12:55:00Z
6
value 0.00141
scoring_system epss
scoring_elements 0.3425
published_at 2026-04-12T12:55:00Z
7
value 0.00141
scoring_system epss
scoring_elements 0.34227
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0367
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0367
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1850889
reference_id 1850889
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1850889
fixed_packages
0
url pkg:deb/debian/gzip@1.3.5-6?distro=trixie
purl pkg:deb/debian/gzip@1.3.5-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-6%3Fdistro=trixie
1
url pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/gzip@1.12-1?distro=trixie
purl pkg:deb/debian/gzip@1.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie
3
url pkg:deb/debian/gzip@1.13-1?distro=trixie
purl pkg:deb/debian/gzip@1.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie
aliases CVE-2003-0367
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w9ut-ky8t-sqar
13
url VCID-xpf8-3pr7-dyew
vulnerability_id VCID-xpf8-3pr7-dyew
summary
gzip contain a bug potentially allowing an attacker to execute arbitrary
    commands.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0603.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0603.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0603
reference_id
reference_type
scores
0
value 0.02503
scoring_system epss
scoring_elements 0.85278
published_at 2026-04-01T12:55:00Z
1
value 0.02503
scoring_system epss
scoring_elements 0.8529
published_at 2026-04-02T12:55:00Z
2
value 0.02503
scoring_system epss
scoring_elements 0.85309
published_at 2026-04-04T12:55:00Z
3
value 0.02503
scoring_system epss
scoring_elements 0.85311
published_at 2026-04-07T12:55:00Z
4
value 0.02503
scoring_system epss
scoring_elements 0.85333
published_at 2026-04-08T12:55:00Z
5
value 0.02503
scoring_system epss
scoring_elements 0.85341
published_at 2026-04-09T12:55:00Z
6
value 0.02503
scoring_system epss
scoring_elements 0.85355
published_at 2026-04-11T12:55:00Z
7
value 0.02503
scoring_system epss
scoring_elements 0.85353
published_at 2026-04-12T12:55:00Z
8
value 0.02503
scoring_system epss
scoring_elements 0.8535
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0603
2
reference_url https://security.gentoo.org/glsa/200406-18
reference_id GLSA-200406-18
reference_type
scores
url https://security.gentoo.org/glsa/200406-18
fixed_packages
0
url pkg:deb/debian/gzip@0?distro=trixie
purl pkg:deb/debian/gzip@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@0%3Fdistro=trixie
1
url pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/gzip@1.12-1?distro=trixie
purl pkg:deb/debian/gzip@1.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie
3
url pkg:deb/debian/gzip@1.13-1?distro=trixie
purl pkg:deb/debian/gzip@1.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie
aliases CVE-2004-0603
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xpf8-3pr7-dyew
14
url VCID-z31n-qyzz-rfhy
vulnerability_id VCID-z31n-qyzz-rfhy
summary
gzip is affected by multiple vulnerabilities, including buffer overflows
    and infinite loops, possibly allowing the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4336.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4336.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4336
reference_id
reference_type
scores
0
value 0.02573
scoring_system epss
scoring_elements 0.85478
published_at 2026-04-01T12:55:00Z
1
value 0.02573
scoring_system epss
scoring_elements 0.8549
published_at 2026-04-02T12:55:00Z
2
value 0.02573
scoring_system epss
scoring_elements 0.85507
published_at 2026-04-04T12:55:00Z
3
value 0.02573
scoring_system epss
scoring_elements 0.85511
published_at 2026-04-07T12:55:00Z
4
value 0.02573
scoring_system epss
scoring_elements 0.85531
published_at 2026-04-08T12:55:00Z
5
value 0.02573
scoring_system epss
scoring_elements 0.8554
published_at 2026-04-09T12:55:00Z
6
value 0.02573
scoring_system epss
scoring_elements 0.85554
published_at 2026-04-11T12:55:00Z
7
value 0.13836
scoring_system epss
scoring_elements 0.94291
published_at 2026-04-12T12:55:00Z
8
value 0.13836
scoring_system epss
scoring_elements 0.94292
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4336
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4336
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4336
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=220595
reference_id 220595
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=220595
4
reference_url https://security.gentoo.org/glsa/200609-13
reference_id GLSA-200609-13
reference_type
scores
url https://security.gentoo.org/glsa/200609-13
5
reference_url https://security.gentoo.org/glsa/200611-24
reference_id GLSA-200611-24
reference_type
scores
url https://security.gentoo.org/glsa/200611-24
6
reference_url https://access.redhat.com/errata/RHSA-2006:0667
reference_id RHSA-2006:0667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0667
7
reference_url https://usn.ubuntu.com/349-1/
reference_id USN-349-1
reference_type
scores
url https://usn.ubuntu.com/349-1/
fixed_packages
0
url pkg:deb/debian/gzip@1.3.5-15?distro=trixie
purl pkg:deb/debian/gzip@1.3.5-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-15%3Fdistro=trixie
1
url pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/gzip@1.12-1?distro=trixie
purl pkg:deb/debian/gzip@1.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie
3
url pkg:deb/debian/gzip@1.13-1?distro=trixie
purl pkg:deb/debian/gzip@1.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie
aliases CVE-2006-4336
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z31n-qyzz-rfhy
15
url VCID-z6cd-db4j-2uey
vulnerability_id VCID-z6cd-db4j-2uey
summary
gzip is affected by multiple vulnerabilities, including buffer overflows
    and infinite loops, possibly allowing the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4335.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4335.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-4335
reference_id
reference_type
scores
0
value 0.009
scoring_system epss
scoring_elements 0.7561
published_at 2026-04-01T12:55:00Z
1
value 0.009
scoring_system epss
scoring_elements 0.75612
published_at 2026-04-02T12:55:00Z
2
value 0.009
scoring_system epss
scoring_elements 0.75643
published_at 2026-04-04T12:55:00Z
3
value 0.009
scoring_system epss
scoring_elements 0.75622
published_at 2026-04-07T12:55:00Z
4
value 0.009
scoring_system epss
scoring_elements 0.75656
published_at 2026-04-08T12:55:00Z
5
value 0.009
scoring_system epss
scoring_elements 0.75668
published_at 2026-04-09T12:55:00Z
6
value 0.009
scoring_system epss
scoring_elements 0.75692
published_at 2026-04-11T12:55:00Z
7
value 0.03561
scoring_system epss
scoring_elements 0.87708
published_at 2026-04-12T12:55:00Z
8
value 0.03561
scoring_system epss
scoring_elements 0.87706
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-4335
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4335
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4335
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=220595
reference_id 220595
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=220595
4
reference_url https://security.gentoo.org/glsa/200609-13
reference_id GLSA-200609-13
reference_type
scores
url https://security.gentoo.org/glsa/200609-13
5
reference_url https://security.gentoo.org/glsa/200611-24
reference_id GLSA-200611-24
reference_type
scores
url https://security.gentoo.org/glsa/200611-24
6
reference_url https://access.redhat.com/errata/RHSA-2006:0667
reference_id RHSA-2006:0667
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0667
7
reference_url https://usn.ubuntu.com/349-1/
reference_id USN-349-1
reference_type
scores
url https://usn.ubuntu.com/349-1/
fixed_packages
0
url pkg:deb/debian/gzip@1.3.5-15?distro=trixie
purl pkg:deb/debian/gzip@1.3.5-15?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-15%3Fdistro=trixie
1
url pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/gzip@1.12-1?distro=trixie
purl pkg:deb/debian/gzip@1.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie
3
url pkg:deb/debian/gzip@1.13-1?distro=trixie
purl pkg:deb/debian/gzip@1.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie
aliases CVE-2006-4335
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z6cd-db4j-2uey
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie