Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libvorbis@1.2.0.dfsg-1?distro=trixie
Typedeb
Namespacedebian
Namelibvorbis
Version1.2.0.dfsg-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.2.0.dfsg-3.1
Latest_non_vulnerable_version1.3.7-3
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-49kj-gbcz-6fd1
vulnerability_id VCID-49kj-gbcz-6fd1
summary
A buffer overflow vulnerability and several memory corruptions have been
    discovered in libvorbis.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4066.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4066.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4066
reference_id
reference_type
scores
0
value 0.01248
scoring_system epss
scoring_elements 0.79261
published_at 2026-04-01T12:55:00Z
1
value 0.01248
scoring_system epss
scoring_elements 0.79268
published_at 2026-04-02T12:55:00Z
2
value 0.01248
scoring_system epss
scoring_elements 0.79292
published_at 2026-04-04T12:55:00Z
3
value 0.01248
scoring_system epss
scoring_elements 0.79277
published_at 2026-04-07T12:55:00Z
4
value 0.01248
scoring_system epss
scoring_elements 0.79303
published_at 2026-04-08T12:55:00Z
5
value 0.01248
scoring_system epss
scoring_elements 0.79313
published_at 2026-04-09T12:55:00Z
6
value 0.01248
scoring_system epss
scoring_elements 0.79336
published_at 2026-04-16T12:55:00Z
7
value 0.01248
scoring_system epss
scoring_elements 0.7932
published_at 2026-04-12T12:55:00Z
8
value 0.01248
scoring_system epss
scoring_elements 0.79309
published_at 2026-04-13T12:55:00Z
9
value 0.01248
scoring_system epss
scoring_elements 0.79332
published_at 2026-04-18T12:55:00Z
10
value 0.01248
scoring_system epss
scoring_elements 0.79333
published_at 2026-04-21T12:55:00Z
11
value 0.01248
scoring_system epss
scoring_elements 0.79366
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4066
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4066
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=249780
reference_id 249780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=249780
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
reference_id 669196
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
5
reference_url https://security.gentoo.org/glsa/200710-03
reference_id GLSA-200710-03
reference_type
scores
url https://security.gentoo.org/glsa/200710-03
6
reference_url https://access.redhat.com/errata/RHSA-2007:0845
reference_id RHSA-2007:0845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0845
7
reference_url https://access.redhat.com/errata/RHSA-2007:0912
reference_id RHSA-2007:0912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0912
fixed_packages
0
url pkg:deb/debian/libvorbis@1.2.0.dfsg-1?distro=trixie
purl pkg:deb/debian/libvorbis@1.2.0.dfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbis@1.2.0.dfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/libvorbis@1.3.7-1?distro=trixie
purl pkg:deb/debian/libvorbis@1.3.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbis@1.3.7-1%3Fdistro=trixie
2
url pkg:deb/debian/libvorbis@1.3.7-3?distro=trixie
purl pkg:deb/debian/libvorbis@1.3.7-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbis@1.3.7-3%3Fdistro=trixie
aliases CVE-2007-4066
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-49kj-gbcz-6fd1
1
url VCID-bv67-87hf-byf5
vulnerability_id VCID-bv67-87hf-byf5
summary
A buffer overflow vulnerability and several memory corruptions have been
    discovered in libvorbis.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3106.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-3106.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-3106
reference_id
reference_type
scores
0
value 0.03005
scoring_system epss
scoring_elements 0.86517
published_at 2026-04-01T12:55:00Z
1
value 0.03005
scoring_system epss
scoring_elements 0.86527
published_at 2026-04-02T12:55:00Z
2
value 0.03005
scoring_system epss
scoring_elements 0.86546
published_at 2026-04-04T12:55:00Z
3
value 0.03005
scoring_system epss
scoring_elements 0.86545
published_at 2026-04-07T12:55:00Z
4
value 0.03005
scoring_system epss
scoring_elements 0.86564
published_at 2026-04-08T12:55:00Z
5
value 0.03005
scoring_system epss
scoring_elements 0.86574
published_at 2026-04-09T12:55:00Z
6
value 0.03005
scoring_system epss
scoring_elements 0.86589
published_at 2026-04-21T12:55:00Z
7
value 0.03005
scoring_system epss
scoring_elements 0.86585
published_at 2026-04-12T12:55:00Z
8
value 0.03005
scoring_system epss
scoring_elements 0.86578
published_at 2026-04-13T12:55:00Z
9
value 0.03005
scoring_system epss
scoring_elements 0.86592
published_at 2026-04-16T12:55:00Z
10
value 0.03005
scoring_system epss
scoring_elements 0.86597
published_at 2026-04-18T12:55:00Z
11
value 0.03005
scoring_system epss
scoring_elements 0.86607
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-3106
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3106
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3106
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=245991
reference_id 245991
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=245991
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
reference_id 669196
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
5
reference_url https://security.gentoo.org/glsa/200710-03
reference_id GLSA-200710-03
reference_type
scores
url https://security.gentoo.org/glsa/200710-03
6
reference_url https://access.redhat.com/errata/RHSA-2007:0845
reference_id RHSA-2007:0845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0845
7
reference_url https://access.redhat.com/errata/RHSA-2007:0912
reference_id RHSA-2007:0912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0912
8
reference_url https://usn.ubuntu.com/498-1/
reference_id USN-498-1
reference_type
scores
url https://usn.ubuntu.com/498-1/
fixed_packages
0
url pkg:deb/debian/libvorbis@1.2.0.dfsg-1?distro=trixie
purl pkg:deb/debian/libvorbis@1.2.0.dfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbis@1.2.0.dfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/libvorbis@1.3.7-1?distro=trixie
purl pkg:deb/debian/libvorbis@1.3.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbis@1.3.7-1%3Fdistro=trixie
2
url pkg:deb/debian/libvorbis@1.3.7-3?distro=trixie
purl pkg:deb/debian/libvorbis@1.3.7-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbis@1.3.7-3%3Fdistro=trixie
aliases CVE-2007-3106
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bv67-87hf-byf5
2
url VCID-dgfg-2eq3-5ybm
vulnerability_id VCID-dgfg-2eq3-5ybm
summary
A buffer overflow vulnerability and several memory corruptions have been
    discovered in libvorbis.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4029.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4029.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4029
reference_id
reference_type
scores
0
value 0.01627
scoring_system epss
scoring_elements 0.818
published_at 2026-04-01T12:55:00Z
1
value 0.01627
scoring_system epss
scoring_elements 0.8181
published_at 2026-04-02T12:55:00Z
2
value 0.01627
scoring_system epss
scoring_elements 0.81833
published_at 2026-04-04T12:55:00Z
3
value 0.01627
scoring_system epss
scoring_elements 0.8183
published_at 2026-04-07T12:55:00Z
4
value 0.01627
scoring_system epss
scoring_elements 0.81856
published_at 2026-04-08T12:55:00Z
5
value 0.01627
scoring_system epss
scoring_elements 0.81863
published_at 2026-04-09T12:55:00Z
6
value 0.01627
scoring_system epss
scoring_elements 0.81882
published_at 2026-04-11T12:55:00Z
7
value 0.01627
scoring_system epss
scoring_elements 0.8187
published_at 2026-04-12T12:55:00Z
8
value 0.01627
scoring_system epss
scoring_elements 0.81865
published_at 2026-04-13T12:55:00Z
9
value 0.01627
scoring_system epss
scoring_elements 0.81901
published_at 2026-04-18T12:55:00Z
10
value 0.01627
scoring_system epss
scoring_elements 0.81904
published_at 2026-04-21T12:55:00Z
11
value 0.01627
scoring_system epss
scoring_elements 0.81927
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4029
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4029
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4029
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=249780
reference_id 249780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=249780
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=437916
reference_id 437916
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=437916
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
reference_id 669196
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
6
reference_url https://security.gentoo.org/glsa/200710-03
reference_id GLSA-200710-03
reference_type
scores
url https://security.gentoo.org/glsa/200710-03
7
reference_url https://access.redhat.com/errata/RHSA-2007:0845
reference_id RHSA-2007:0845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0845
8
reference_url https://access.redhat.com/errata/RHSA-2007:0912
reference_id RHSA-2007:0912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0912
9
reference_url https://usn.ubuntu.com/498-1/
reference_id USN-498-1
reference_type
scores
url https://usn.ubuntu.com/498-1/
fixed_packages
0
url pkg:deb/debian/libvorbis@1.2.0.dfsg-1?distro=trixie
purl pkg:deb/debian/libvorbis@1.2.0.dfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbis@1.2.0.dfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/libvorbis@1.3.7-1?distro=trixie
purl pkg:deb/debian/libvorbis@1.3.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbis@1.3.7-1%3Fdistro=trixie
2
url pkg:deb/debian/libvorbis@1.3.7-3?distro=trixie
purl pkg:deb/debian/libvorbis@1.3.7-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbis@1.3.7-3%3Fdistro=trixie
aliases CVE-2007-4029
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dgfg-2eq3-5ybm
3
url VCID-mekv-71pb-mfdw
vulnerability_id VCID-mekv-71pb-mfdw
summary
A buffer overflow vulnerability and several memory corruptions have been
    discovered in libvorbis.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4065.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4065.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4065
reference_id
reference_type
scores
0
value 0.05346
scoring_system epss
scoring_elements 0.90029
published_at 2026-04-01T12:55:00Z
1
value 0.05346
scoring_system epss
scoring_elements 0.90032
published_at 2026-04-02T12:55:00Z
2
value 0.05346
scoring_system epss
scoring_elements 0.90043
published_at 2026-04-04T12:55:00Z
3
value 0.05346
scoring_system epss
scoring_elements 0.90048
published_at 2026-04-07T12:55:00Z
4
value 0.05346
scoring_system epss
scoring_elements 0.90063
published_at 2026-04-08T12:55:00Z
5
value 0.05346
scoring_system epss
scoring_elements 0.90069
published_at 2026-04-09T12:55:00Z
6
value 0.05424
scoring_system epss
scoring_elements 0.90166
published_at 2026-04-11T12:55:00Z
7
value 0.05424
scoring_system epss
scoring_elements 0.90164
published_at 2026-04-12T12:55:00Z
8
value 0.05424
scoring_system epss
scoring_elements 0.90159
published_at 2026-04-13T12:55:00Z
9
value 0.05424
scoring_system epss
scoring_elements 0.90177
published_at 2026-04-18T12:55:00Z
10
value 0.05424
scoring_system epss
scoring_elements 0.90173
published_at 2026-04-21T12:55:00Z
11
value 0.05424
scoring_system epss
scoring_elements 0.90188
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4065
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4065
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=249780
reference_id 249780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=249780
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
reference_id 669196
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=669196
5
reference_url https://security.gentoo.org/glsa/200710-03
reference_id GLSA-200710-03
reference_type
scores
url https://security.gentoo.org/glsa/200710-03
6
reference_url https://access.redhat.com/errata/RHSA-2007:0845
reference_id RHSA-2007:0845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0845
7
reference_url https://access.redhat.com/errata/RHSA-2007:0912
reference_id RHSA-2007:0912
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0912
fixed_packages
0
url pkg:deb/debian/libvorbis@1.2.0.dfsg-1?distro=trixie
purl pkg:deb/debian/libvorbis@1.2.0.dfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbis@1.2.0.dfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/libvorbis@1.3.7-1?distro=trixie
purl pkg:deb/debian/libvorbis@1.3.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbis@1.3.7-1%3Fdistro=trixie
2
url pkg:deb/debian/libvorbis@1.3.7-3?distro=trixie
purl pkg:deb/debian/libvorbis@1.3.7-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbis@1.3.7-3%3Fdistro=trixie
aliases CVE-2007-4065
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mekv-71pb-mfdw
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libvorbis@1.2.0.dfsg-1%3Fdistro=trixie