Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libbpf@1.1.0-1?distro=trixie
Typedeb
Namespacedebian
Namelibbpf
Version1.1.0-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.5.0-3
Latest_non_vulnerable_version1.7.0-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-4gdy-gqe4-93f4
vulnerability_id VCID-4gdy-gqe4-93f4
summary Kernel: use-after-free in btf_dump_name_dups in tools/lib/bpf/btf_dump.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3534.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3534.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3534
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08521
published_at 2026-04-24T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08526
published_at 2026-04-21T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.09364
published_at 2026-04-11T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.09212
published_at 2026-04-18T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.0931
published_at 2026-04-08T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09353
published_at 2026-04-09T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09336
published_at 2026-04-12T12:55:00Z
7
value 0.00032
scoring_system epss
scoring_elements 0.09269
published_at 2026-04-02T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09213
published_at 2026-04-16T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.09322
published_at 2026-04-13T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.0932
published_at 2026-04-04T12:55:00Z
11
value 0.00032
scoring_system epss
scoring_elements 0.09235
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3534
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3534
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023717
reference_id 1023717
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023717
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165706
reference_id 2165706
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165706
6
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
7
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
8
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
9
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
10
reference_url https://vuldb.com/?id.211032
reference_id ?id.211032
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:09:09Z/
url https://vuldb.com/?id.211032
11
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93c660ca40b5d2f7c1b1626e955a8e9fa30e0749
reference_id ?id=93c660ca40b5d2f7c1b1626e955a8e9fa30e0749
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:09:09Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=93c660ca40b5d2f7c1b1626e955a8e9fa30e0749
12
reference_url https://usn.ubuntu.com/5759-1/
reference_id USN-5759-1
reference_type
scores
url https://usn.ubuntu.com/5759-1/
13
reference_url https://usn.ubuntu.com/6215-1/
reference_id USN-6215-1
reference_type
scores
url https://usn.ubuntu.com/6215-1/
14
reference_url https://usn.ubuntu.com/USN-5759-2/
reference_id USN-USN-5759-2
reference_type
scores
url https://usn.ubuntu.com/USN-5759-2/
fixed_packages
0
url pkg:deb/debian/libbpf@0.3-2?distro=trixie
purl pkg:deb/debian/libbpf@0.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qxa-43jg-gfak
1
vulnerability VCID-x1fv-5t74-vugy
2
vulnerability VCID-x4wf-7dmt-sfaq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@0.3-2%3Fdistro=trixie
1
url pkg:deb/debian/libbpf@0.3-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/libbpf@0.3-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@0.3-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/libbpf@1.1.0-1?distro=trixie
purl pkg:deb/debian/libbpf@1.1.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.1.0-1%3Fdistro=trixie
3
url pkg:deb/debian/libbpf@1.1.2-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libbpf@1.1.2-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qxa-43jg-gfak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.1.2-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/libbpf@1.5.0-3?distro=trixie
purl pkg:deb/debian/libbpf@1.5.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.5.0-3%3Fdistro=trixie
5
url pkg:deb/debian/libbpf@1.6.3-1?distro=trixie
purl pkg:deb/debian/libbpf@1.6.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.6.3-1%3Fdistro=trixie
6
url pkg:deb/debian/libbpf@1.7.0-1?distro=trixie
purl pkg:deb/debian/libbpf@1.7.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.7.0-1%3Fdistro=trixie
aliases CVE-2022-3534
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4gdy-gqe4-93f4
1
url VCID-gudk-drsz-vfhw
vulnerability_id VCID-gudk-drsz-vfhw
summary Kernel: memory lean in parse_usdt_arg in tools/lib/bpf/usdt.c in BPF
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3533.json
reference_id
reference_type
scores
0
value 3.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3533.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3533
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.08885
published_at 2026-04-11T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.08887
published_at 2026-04-09T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.08854
published_at 2026-04-12T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.0884
published_at 2026-04-13T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.08727
published_at 2026-04-16T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.08703
published_at 2026-04-18T12:55:00Z
6
value 0.00031
scoring_system epss
scoring_elements 0.08783
published_at 2026-04-07T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.08861
published_at 2026-04-08T12:55:00Z
8
value 0.00032
scoring_system epss
scoring_elements 0.09087
published_at 2026-04-02T12:55:00Z
9
value 0.00032
scoring_system epss
scoring_elements 0.0914
published_at 2026-04-04T12:55:00Z
10
value 0.00032
scoring_system epss
scoring_elements 0.09157
published_at 2026-04-21T12:55:00Z
11
value 0.00032
scoring_system epss
scoring_elements 0.092
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3533
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023717
reference_id 1023717
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023717
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2165625
reference_id 2165625
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2165625
5
reference_url https://usn.ubuntu.com/5759-1/
reference_id USN-5759-1
reference_type
scores
url https://usn.ubuntu.com/5759-1/
fixed_packages
0
url pkg:deb/debian/libbpf@0?distro=trixie
purl pkg:deb/debian/libbpf@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@0%3Fdistro=trixie
1
url pkg:deb/debian/libbpf@0.3-2?distro=trixie
purl pkg:deb/debian/libbpf@0.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qxa-43jg-gfak
1
vulnerability VCID-x1fv-5t74-vugy
2
vulnerability VCID-x4wf-7dmt-sfaq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@0.3-2%3Fdistro=trixie
2
url pkg:deb/debian/libbpf@1.1.0-1?distro=trixie
purl pkg:deb/debian/libbpf@1.1.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.1.0-1%3Fdistro=trixie
3
url pkg:deb/debian/libbpf@1.1.2-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libbpf@1.1.2-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qxa-43jg-gfak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.1.2-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/libbpf@1.5.0-3?distro=trixie
purl pkg:deb/debian/libbpf@1.5.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.5.0-3%3Fdistro=trixie
5
url pkg:deb/debian/libbpf@1.6.3-1?distro=trixie
purl pkg:deb/debian/libbpf@1.6.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.6.3-1%3Fdistro=trixie
6
url pkg:deb/debian/libbpf@1.7.0-1?distro=trixie
purl pkg:deb/debian/libbpf@1.7.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.7.0-1%3Fdistro=trixie
aliases CVE-2022-3533
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gudk-drsz-vfhw
2
url VCID-vu3z-hmu8-fkbn
vulnerability_id VCID-vu3z-hmu8-fkbn
summary kernel: libbpf: NULL pointer dereference in find_prog_by_sec_insn
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3606.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-3606.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-3606
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.05311
published_at 2026-04-24T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.04988
published_at 2026-04-07T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.05021
published_at 2026-04-08T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.05037
published_at 2026-04-09T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.05018
published_at 2026-04-11T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.04999
published_at 2026-04-12T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.0498
published_at 2026-04-13T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.04926
published_at 2026-04-16T12:55:00Z
8
value 0.00019
scoring_system epss
scoring_elements 0.04936
published_at 2026-04-18T12:55:00Z
9
value 0.00019
scoring_system epss
scoring_elements 0.05274
published_at 2026-04-21T12:55:00Z
10
value 0.00019
scoring_system epss
scoring_elements 0.05137
published_at 2026-04-02T12:55:00Z
11
value 0.00019
scoring_system epss
scoring_elements 0.05163
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-3606
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3606
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3606
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023717
reference_id 1023717
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023717
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2155196
reference_id 2155196
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2155196
6
reference_url https://security.archlinux.org/AVG-2834
reference_id AVG-2834
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2834
7
reference_url https://security.archlinux.org/AVG-2835
reference_id AVG-2835
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2835
8
reference_url https://security.archlinux.org/AVG-2836
reference_id AVG-2836
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2836
9
reference_url https://security.archlinux.org/AVG-2837
reference_id AVG-2837
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2837
10
reference_url https://vuldb.com/?id.211749
reference_id ?id.211749
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:19Z/
url https://vuldb.com/?id.211749
11
reference_url https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=d0d382f95a9270dcf803539d6781d6bd67e3f5b2
reference_id ?id=d0d382f95a9270dcf803539d6781d6bd67e3f5b2
reference_type
scores
0
value 3.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:08:19Z/
url https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/commit/?id=d0d382f95a9270dcf803539d6781d6bd67e3f5b2
12
reference_url https://usn.ubuntu.com/5759-1/
reference_id USN-5759-1
reference_type
scores
url https://usn.ubuntu.com/5759-1/
13
reference_url https://usn.ubuntu.com/6215-1/
reference_id USN-6215-1
reference_type
scores
url https://usn.ubuntu.com/6215-1/
14
reference_url https://usn.ubuntu.com/USN-5759-2/
reference_id USN-USN-5759-2
reference_type
scores
url https://usn.ubuntu.com/USN-5759-2/
fixed_packages
0
url pkg:deb/debian/libbpf@0.3-2?distro=trixie
purl pkg:deb/debian/libbpf@0.3-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qxa-43jg-gfak
1
vulnerability VCID-x1fv-5t74-vugy
2
vulnerability VCID-x4wf-7dmt-sfaq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@0.3-2%3Fdistro=trixie
1
url pkg:deb/debian/libbpf@0.3-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/libbpf@0.3-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@0.3-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/libbpf@1.1.0-1?distro=trixie
purl pkg:deb/debian/libbpf@1.1.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.1.0-1%3Fdistro=trixie
3
url pkg:deb/debian/libbpf@1.1.2-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/libbpf@1.1.2-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qxa-43jg-gfak
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.1.2-0%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/libbpf@1.5.0-3?distro=trixie
purl pkg:deb/debian/libbpf@1.5.0-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.5.0-3%3Fdistro=trixie
5
url pkg:deb/debian/libbpf@1.6.3-1?distro=trixie
purl pkg:deb/debian/libbpf@1.6.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.6.3-1%3Fdistro=trixie
6
url pkg:deb/debian/libbpf@1.7.0-1?distro=trixie
purl pkg:deb/debian/libbpf@1.7.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.7.0-1%3Fdistro=trixie
aliases CVE-2022-3606
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vu3z-hmu8-fkbn
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libbpf@1.1.0-1%3Fdistro=trixie