Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/pvpgn@1.99.7.2.1%2Bdfsg-3?distro=trixie
Typedeb
Namespacedebian
Namepvpgn
Version1.99.7.2.1+dfsg-3
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1vu9-xzw9-kfe2
vulnerability_id VCID-1vu9-xzw9-kfe2
summary zlib DoS
references
0
reference_url ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:16.zlib.asc
reference_id
reference_type
scores
url ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:16.zlib.asc
1
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.6/SCOSA-2006.6.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.6/SCOSA-2006.6.txt
2
reference_url http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
3
reference_url http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
4
reference_url http://lists.apple.com/archives/security-announce//2008/Nov/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Nov/msg00001.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2096.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2096.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-2096
reference_id
reference_type
scores
0
value 0.43032
scoring_system epss
scoring_elements 0.975
published_at 2026-04-21T12:55:00Z
1
value 0.43032
scoring_system epss
scoring_elements 0.97466
published_at 2026-04-01T12:55:00Z
2
value 0.43032
scoring_system epss
scoring_elements 0.97473
published_at 2026-04-02T12:55:00Z
3
value 0.43032
scoring_system epss
scoring_elements 0.97476
published_at 2026-04-04T12:55:00Z
4
value 0.43032
scoring_system epss
scoring_elements 0.97477
published_at 2026-04-07T12:55:00Z
5
value 0.43032
scoring_system epss
scoring_elements 0.97483
published_at 2026-04-08T12:55:00Z
6
value 0.43032
scoring_system epss
scoring_elements 0.97484
published_at 2026-04-09T12:55:00Z
7
value 0.43032
scoring_system epss
scoring_elements 0.97487
published_at 2026-04-11T12:55:00Z
8
value 0.43032
scoring_system epss
scoring_elements 0.97489
published_at 2026-04-12T12:55:00Z
9
value 0.43032
scoring_system epss
scoring_elements 0.9749
published_at 2026-04-13T12:55:00Z
10
value 0.43032
scoring_system epss
scoring_elements 0.97497
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-2096
7
reference_url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162391
reference_id
reference_type
scores
url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162391
8
reference_url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162680
reference_id
reference_type
scores
url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162680
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2096
10
reference_url http://secunia.com/advisories/15949
reference_id
reference_type
scores
url http://secunia.com/advisories/15949
11
reference_url http://secunia.com/advisories/17054
reference_id
reference_type
scores
url http://secunia.com/advisories/17054
12
reference_url http://secunia.com/advisories/17225
reference_id
reference_type
scores
url http://secunia.com/advisories/17225
13
reference_url http://secunia.com/advisories/17236
reference_id
reference_type
scores
url http://secunia.com/advisories/17236
14
reference_url http://secunia.com/advisories/17326
reference_id
reference_type
scores
url http://secunia.com/advisories/17326
15
reference_url http://secunia.com/advisories/17516
reference_id
reference_type
scores
url http://secunia.com/advisories/17516
16
reference_url http://secunia.com/advisories/18377
reference_id
reference_type
scores
url http://secunia.com/advisories/18377
17
reference_url http://secunia.com/advisories/18406
reference_id
reference_type
scores
url http://secunia.com/advisories/18406
18
reference_url http://secunia.com/advisories/18507
reference_id
reference_type
scores
url http://secunia.com/advisories/18507
19
reference_url http://secunia.com/advisories/19550
reference_id
reference_type
scores
url http://secunia.com/advisories/19550
20
reference_url http://secunia.com/advisories/19597
reference_id
reference_type
scores
url http://secunia.com/advisories/19597
21
reference_url http://secunia.com/advisories/24788
reference_id
reference_type
scores
url http://secunia.com/advisories/24788
22
reference_url http://secunia.com/advisories/31492
reference_id
reference_type
scores
url http://secunia.com/advisories/31492
23
reference_url http://secunia.com/advisories/32706
reference_id
reference_type
scores
url http://secunia.com/advisories/32706
24
reference_url http://security.gentoo.org/glsa/glsa-200507-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200507-05.xml
25
reference_url http://securitytracker.com/id?1014398
reference_id
reference_type
scores
url http://securitytracker.com/id?1014398
26
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/24064
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/24064
27
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11500
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11500
28
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1262
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1262
29
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1542
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1542
30
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-101989-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-101989-1
31
reference_url http://support.apple.com/kb/HT3298
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3298
32
reference_url http://support.avaya.com/elmodocs2/security/ASA-2006-016.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2006-016.htm
33
reference_url http://www.debian.org/security/2005/dsa-740
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-740
34
reference_url http://www.debian.org/security/2005/dsa-797
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-797
35
reference_url http://www.debian.org/security/2006/dsa-1026
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-1026
36
reference_url http://www.gentoo.org/security/en/glsa/glsa-200509-18.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200509-18.xml
37
reference_url http://www.kb.cert.org/vuls/id/680620
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/680620
38
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:112
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:112
39
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:196
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:196
40
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:070
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:070
41
reference_url http://www.redhat.com/support/errata/RHSA-2005-569.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-569.html
42
reference_url http://www.redhat.com/support/errata/RHSA-2008-0629.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0629.html
43
reference_url http://www.securityfocus.com/archive/1/421411/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/421411/100/0/threaded
44
reference_url http://www.securityfocus.com/archive/1/464745/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464745/100/0/threaded
45
reference_url http://www.securityfocus.com/archive/1/482503/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/482503/100/0/threaded
46
reference_url http://www.securityfocus.com/archive/1/482505/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/482505/100/0/threaded
47
reference_url http://www.securityfocus.com/archive/1/482571/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/482571/100/0/threaded
48
reference_url http://www.securityfocus.com/archive/1/482601/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/482601/100/0/threaded
49
reference_url http://www.securityfocus.com/archive/1/482949/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/482949/100/0/threaded
50
reference_url http://www.securityfocus.com/archive/1/482950/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/482950/100/0/threaded
51
reference_url http://www.securityfocus.com/bid/14162
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/14162
52
reference_url http://www.ubuntulinux.org/usn/usn-151-3
reference_id
reference_type
scores
url http://www.ubuntulinux.org/usn/usn-151-3
53
reference_url http://www.vmware.com/support/vi3/doc/esx-3616065-patch.html
reference_id
reference_type
scores
url http://www.vmware.com/support/vi3/doc/esx-3616065-patch.html
54
reference_url http://www.vmware.com/support/vi3/doc/esx-9916286-patch.html
reference_id
reference_type
scores
url http://www.vmware.com/support/vi3/doc/esx-9916286-patch.html
55
reference_url http://www.vupen.com/english/advisories/2005/0978
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/0978
56
reference_url http://www.vupen.com/english/advisories/2006/0144
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/0144
57
reference_url http://www.vupen.com/english/advisories/2007/1267
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1267
58
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317133
reference_id 317133
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317133
59
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317523
reference_id 317523
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317523
60
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317966
reference_id 317966
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317966
61
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317967
reference_id 317967
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317967
62
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317968
reference_id 317968
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317968
63
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318014
reference_id 318014
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318014
64
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318069
reference_id 318069
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318069
65
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318091
reference_id 318091
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318091
66
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318099
reference_id 318099
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318099
67
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318100
reference_id 318100
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318100
68
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=332236
reference_id 332236
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=332236
69
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=430650
reference_id 430650
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=430650
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zlib:zlib:1.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:zlib:zlib:1.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zlib:zlib:1.2.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zlib:zlib:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:zlib:zlib:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zlib:zlib:1.2.1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zlib:zlib:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:zlib:zlib:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zlib:zlib:1.2.2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-2096
reference_id CVE-2005-2096
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-2096
74
reference_url https://access.redhat.com/errata/RHSA-2005:569
reference_id RHSA-2005:569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:569
75
reference_url https://access.redhat.com/errata/RHSA-2008:0264
reference_id RHSA-2008:0264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0264
76
reference_url https://access.redhat.com/errata/RHSA-2008:0525
reference_id RHSA-2008:0525
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0525
77
reference_url https://access.redhat.com/errata/RHSA-2008:0629
reference_id RHSA-2008:0629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0629
78
reference_url https://usn.ubuntu.com/148-1/
reference_id USN-148-1
reference_type
scores
url https://usn.ubuntu.com/148-1/
79
reference_url https://usn.ubuntu.com/151-2/
reference_id USN-151-2
reference_type
scores
url https://usn.ubuntu.com/151-2/
80
reference_url https://usn.ubuntu.com/151-3/
reference_id USN-151-3
reference_type
scores
url https://usn.ubuntu.com/151-3/
81
reference_url https://usn.ubuntu.com/151-4/
reference_id USN-151-4
reference_type
scores
url https://usn.ubuntu.com/151-4/
fixed_packages
0
url pkg:deb/debian/pvpgn@1.7.8-2?distro=trixie
purl pkg:deb/debian/pvpgn@1.7.8-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pvpgn@1.7.8-2%3Fdistro=trixie
1
url pkg:deb/debian/pvpgn@1.8.5-2.1?distro=trixie
purl pkg:deb/debian/pvpgn@1.8.5-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pvpgn@1.8.5-2.1%3Fdistro=trixie
2
url pkg:deb/debian/pvpgn@1.8.5-3?distro=trixie
purl pkg:deb/debian/pvpgn@1.8.5-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pvpgn@1.8.5-3%3Fdistro=trixie
3
url pkg:deb/debian/pvpgn@1.99.7.2.1%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/pvpgn@1.99.7.2.1%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pvpgn@1.99.7.2.1%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/pvpgn@1.99.7.2.1%2Bdfsg-3?distro=trixie
purl pkg:deb/debian/pvpgn@1.99.7.2.1%2Bdfsg-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pvpgn@1.99.7.2.1%252Bdfsg-3%3Fdistro=trixie
aliases CVE-2005-2096
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1vu9-xzw9-kfe2
1
url VCID-2ruc-2uvy-8fcr
vulnerability_id VCID-2ruc-2uvy-8fcr
summary pvpgn-support-installer in pvpgn 1.8.1 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/pvpgn-support-1.0.tar.gz temporary file.
references
0
reference_url http://lists.debian.org/debian-devel/2008/08/msg00283.html
reference_id
reference_type
scores
url http://lists.debian.org/debian-devel/2008/08/msg00283.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-5370
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06642
published_at 2026-04-21T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.06422
published_at 2026-04-01T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06455
published_at 2026-04-02T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06492
published_at 2026-04-18T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06481
published_at 2026-04-07T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06531
published_at 2026-04-08T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06572
published_at 2026-04-09T12:55:00Z
7
value 0.00024
scoring_system epss
scoring_elements 0.06566
published_at 2026-04-11T12:55:00Z
8
value 0.00024
scoring_system epss
scoring_elements 0.06558
published_at 2026-04-12T12:55:00Z
9
value 0.00024
scoring_system epss
scoring_elements 0.06549
published_at 2026-04-13T12:55:00Z
10
value 0.00024
scoring_system epss
scoring_elements 0.06484
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-5370
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5370
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=509336
reference_id 509336
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=509336
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pvpgn:pvpgn:1.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:pvpgn:pvpgn:1.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:pvpgn:pvpgn:1.8.1:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-5370
reference_id CVE-2008-5370
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2008-5370
fixed_packages
0
url pkg:deb/debian/pvpgn@1.8.1-2?distro=trixie
purl pkg:deb/debian/pvpgn@1.8.1-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pvpgn@1.8.1-2%3Fdistro=trixie
1
url pkg:deb/debian/pvpgn@1.8.5-2.1?distro=trixie
purl pkg:deb/debian/pvpgn@1.8.5-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pvpgn@1.8.5-2.1%3Fdistro=trixie
2
url pkg:deb/debian/pvpgn@1.8.5-3?distro=trixie
purl pkg:deb/debian/pvpgn@1.8.5-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pvpgn@1.8.5-3%3Fdistro=trixie
3
url pkg:deb/debian/pvpgn@1.99.7.2.1%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/pvpgn@1.99.7.2.1%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pvpgn@1.99.7.2.1%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/pvpgn@1.99.7.2.1%2Bdfsg-3?distro=trixie
purl pkg:deb/debian/pvpgn@1.99.7.2.1%2Bdfsg-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pvpgn@1.99.7.2.1%252Bdfsg-3%3Fdistro=trixie
aliases CVE-2008-5370
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2ruc-2uvy-8fcr
2
url VCID-cfmp-hgga-8ff5
vulnerability_id VCID-cfmp-hgga-8ff5
summary Unspecified vulnerability in Player vs. Player Gaming Network (PvPGN) before 1.6.4 allows remote attackers to obtain attributes of arbitrary accounts, including the password hash, via certain statsreq packets.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-2705
reference_id
reference_type
scores
0
value 0.00551
scoring_system epss
scoring_elements 0.67928
published_at 2026-04-01T12:55:00Z
1
value 0.00551
scoring_system epss
scoring_elements 0.6795
published_at 2026-04-02T12:55:00Z
2
value 0.00551
scoring_system epss
scoring_elements 0.67969
published_at 2026-04-04T12:55:00Z
3
value 0.00551
scoring_system epss
scoring_elements 0.67948
published_at 2026-04-07T12:55:00Z
4
value 0.00551
scoring_system epss
scoring_elements 0.67999
published_at 2026-04-08T12:55:00Z
5
value 0.00551
scoring_system epss
scoring_elements 0.68013
published_at 2026-04-09T12:55:00Z
6
value 0.00551
scoring_system epss
scoring_elements 0.68036
published_at 2026-04-11T12:55:00Z
7
value 0.00551
scoring_system epss
scoring_elements 0.68022
published_at 2026-04-12T12:55:00Z
8
value 0.00551
scoring_system epss
scoring_elements 0.67988
published_at 2026-04-13T12:55:00Z
9
value 0.00551
scoring_system epss
scoring_elements 0.68025
published_at 2026-04-16T12:55:00Z
10
value 0.00551
scoring_system epss
scoring_elements 0.68038
published_at 2026-04-18T12:55:00Z
11
value 0.00551
scoring_system epss
scoring_elements 0.6802
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-2705
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2705
fixed_packages
0
url pkg:deb/debian/pvpgn@1.6.4%2B20040826-1?distro=trixie
purl pkg:deb/debian/pvpgn@1.6.4%2B20040826-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pvpgn@1.6.4%252B20040826-1%3Fdistro=trixie
1
url pkg:deb/debian/pvpgn@1.8.5-2.1?distro=trixie
purl pkg:deb/debian/pvpgn@1.8.5-2.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pvpgn@1.8.5-2.1%3Fdistro=trixie
2
url pkg:deb/debian/pvpgn@1.8.5-3?distro=trixie
purl pkg:deb/debian/pvpgn@1.8.5-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pvpgn@1.8.5-3%3Fdistro=trixie
3
url pkg:deb/debian/pvpgn@1.99.7.2.1%2Bdfsg-2?distro=trixie
purl pkg:deb/debian/pvpgn@1.99.7.2.1%2Bdfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pvpgn@1.99.7.2.1%252Bdfsg-2%3Fdistro=trixie
4
url pkg:deb/debian/pvpgn@1.99.7.2.1%2Bdfsg-3?distro=trixie
purl pkg:deb/debian/pvpgn@1.99.7.2.1%2Bdfsg-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pvpgn@1.99.7.2.1%252Bdfsg-3%3Fdistro=trixie
aliases CVE-2004-2705
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cfmp-hgga-8ff5
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/pvpgn@1.99.7.2.1%252Bdfsg-3%3Fdistro=trixie