Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/rsync@2.6.1-1?distro=trixie
Typedeb
Namespacedebian
Namersync
Version2.6.1-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.6.2-3
Latest_non_vulnerable_version3.4.1+ds1-7
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-c8h5-wzqz-e3c6
vulnerability_id VCID-c8h5-wzqz-e3c6
summary Buffer overflow in the open_socket_out function in socket.c for rsync 2.5.7 and earlier allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long RSYNC_PROXY environment variable. NOTE: since rsync is not setuid, this issue does not provide any additional privileges beyond those that are already available to the user. Therefore this issue may be REJECTED in the future.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-2093
reference_id
reference_type
scores
0
value 0.00728
scoring_system epss
scoring_elements 0.72573
published_at 2026-04-01T12:55:00Z
1
value 0.00728
scoring_system epss
scoring_elements 0.72581
published_at 2026-04-02T12:55:00Z
2
value 0.00728
scoring_system epss
scoring_elements 0.72598
published_at 2026-04-04T12:55:00Z
3
value 0.00728
scoring_system epss
scoring_elements 0.72574
published_at 2026-04-07T12:55:00Z
4
value 0.00728
scoring_system epss
scoring_elements 0.72613
published_at 2026-04-08T12:55:00Z
5
value 0.00728
scoring_system epss
scoring_elements 0.72625
published_at 2026-04-09T12:55:00Z
6
value 0.00728
scoring_system epss
scoring_elements 0.72648
published_at 2026-04-11T12:55:00Z
7
value 0.00728
scoring_system epss
scoring_elements 0.72631
published_at 2026-04-12T12:55:00Z
8
value 0.00728
scoring_system epss
scoring_elements 0.72621
published_at 2026-04-13T12:55:00Z
9
value 0.00728
scoring_system epss
scoring_elements 0.72663
published_at 2026-04-16T12:55:00Z
10
value 0.00728
scoring_system epss
scoring_elements 0.72673
published_at 2026-04-18T12:55:00Z
11
value 0.00728
scoring_system epss
scoring_elements 0.72664
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-2093
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2093
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2093
2
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/152.c
reference_id OSVDB-45182;CVE-2004-2093
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/152.c
fixed_packages
0
url pkg:deb/debian/rsync@2.6.1-1?distro=trixie
purl pkg:deb/debian/rsync@2.6.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsync@2.6.1-1%3Fdistro=trixie
1
url pkg:deb/debian/rsync@3.2.3-4%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/rsync@3.2.3-4%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4g3g-qmrg-tbf6
1
vulnerability VCID-ua8q-v9qd-wqb5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsync@3.2.3-4%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/rsync@3.2.7-1%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/rsync@3.2.7-1%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsync@3.2.7-1%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/rsync@3.4.1%2Bds1-5%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/rsync@3.4.1%2Bds1-5%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsync@3.4.1%252Bds1-5%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/rsync@3.4.1%2Bds1-7?distro=trixie
purl pkg:deb/debian/rsync@3.4.1%2Bds1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsync@3.4.1%252Bds1-7%3Fdistro=trixie
aliases CVE-2004-2093
risk_score null
exploitability 2.0
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c8h5-wzqz-e3c6
1
url VCID-su3r-5r3f-fbfr
vulnerability_id VCID-su3r-5r3f-fbfr
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0426.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0426.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0426
reference_id
reference_type
scores
0
value 0.03446
scoring_system epss
scoring_elements 0.87438
published_at 2026-04-01T12:55:00Z
1
value 0.03446
scoring_system epss
scoring_elements 0.87448
published_at 2026-04-02T12:55:00Z
2
value 0.03446
scoring_system epss
scoring_elements 0.87462
published_at 2026-04-04T12:55:00Z
3
value 0.03446
scoring_system epss
scoring_elements 0.87463
published_at 2026-04-07T12:55:00Z
4
value 0.03446
scoring_system epss
scoring_elements 0.87483
published_at 2026-04-08T12:55:00Z
5
value 0.03446
scoring_system epss
scoring_elements 0.87489
published_at 2026-04-09T12:55:00Z
6
value 0.03446
scoring_system epss
scoring_elements 0.875
published_at 2026-04-11T12:55:00Z
7
value 0.03446
scoring_system epss
scoring_elements 0.87496
published_at 2026-04-12T12:55:00Z
8
value 0.03446
scoring_system epss
scoring_elements 0.87493
published_at 2026-04-13T12:55:00Z
9
value 0.03446
scoring_system epss
scoring_elements 0.87508
published_at 2026-04-21T12:55:00Z
10
value 0.03446
scoring_system epss
scoring_elements 0.8751
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0426
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0426
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617206
reference_id 1617206
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617206
4
reference_url https://access.redhat.com/errata/RHSA-2004:192
reference_id RHSA-2004:192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:192
fixed_packages
0
url pkg:deb/debian/rsync@2.6.1-1?distro=trixie
purl pkg:deb/debian/rsync@2.6.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsync@2.6.1-1%3Fdistro=trixie
1
url pkg:deb/debian/rsync@3.2.3-4%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/rsync@3.2.3-4%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4g3g-qmrg-tbf6
1
vulnerability VCID-ua8q-v9qd-wqb5
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsync@3.2.3-4%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/rsync@3.2.7-1%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/rsync@3.2.7-1%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsync@3.2.7-1%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/rsync@3.4.1%2Bds1-5%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/rsync@3.4.1%2Bds1-5%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsync@3.4.1%252Bds1-5%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/rsync@3.4.1%2Bds1-7?distro=trixie
purl pkg:deb/debian/rsync@3.4.1%2Bds1-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/rsync@3.4.1%252Bds1-7%3Fdistro=trixie
aliases CVE-2004-0426
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-su3r-5r3f-fbfr
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/rsync@2.6.1-1%3Fdistro=trixie