Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/tar@1.16-2?distro=trixie
Typedeb
Namespacedebian
Nametar
Version1.16-2
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.18-1
Latest_non_vulnerable_version1.35+dfsg-4
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-zn6w-f898-tqgd
vulnerability_id VCID-zn6w-f898-tqgd
summary
Tar is vulnerable to directory traversal possibly allowing for the
    overwriting of arbitrary files.
references
0
reference_url ftp://patches.sgi.com/support/free/security/advisories/20061202-01-P.asc
reference_id
reference_type
scores
url ftp://patches.sgi.com/support/free/security/advisories/20061202-01-P.asc
1
reference_url http://docs.info.apple.com/article.html?artnum=305214
reference_id
reference_type
scores
url http://docs.info.apple.com/article.html?artnum=305214
2
reference_url http://kb.vmware.com/KanisaPlatform/Publishing/817/2240267_f.SAL_Public.html
reference_id
reference_type
scores
url http://kb.vmware.com/KanisaPlatform/Publishing/817/2240267_f.SAL_Public.html
3
reference_url http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html
4
reference_url http://lists.grok.org.uk/pipermail/full-disclosure/2006-November/050812.html
reference_id
reference_type
scores
url http://lists.grok.org.uk/pipermail/full-disclosure/2006-November/050812.html
5
reference_url http://rhn.redhat.com/errata/RHSA-2006-0749.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2006-0749.html
6
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6097.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-6097.json
7
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-6097
reference_id
reference_type
scores
0
value 0.10442
scoring_system epss
scoring_elements 0.93255
published_at 2026-04-21T12:55:00Z
1
value 0.10442
scoring_system epss
scoring_elements 0.932
published_at 2026-04-01T12:55:00Z
2
value 0.10442
scoring_system epss
scoring_elements 0.93209
published_at 2026-04-02T12:55:00Z
3
value 0.10442
scoring_system epss
scoring_elements 0.93213
published_at 2026-04-04T12:55:00Z
4
value 0.10442
scoring_system epss
scoring_elements 0.93211
published_at 2026-04-07T12:55:00Z
5
value 0.10442
scoring_system epss
scoring_elements 0.93219
published_at 2026-04-08T12:55:00Z
6
value 0.10442
scoring_system epss
scoring_elements 0.93224
published_at 2026-04-09T12:55:00Z
7
value 0.10442
scoring_system epss
scoring_elements 0.93228
published_at 2026-04-11T12:55:00Z
8
value 0.10442
scoring_system epss
scoring_elements 0.93225
published_at 2026-04-12T12:55:00Z
9
value 0.10442
scoring_system epss
scoring_elements 0.93227
published_at 2026-04-13T12:55:00Z
10
value 0.10442
scoring_system epss
scoring_elements 0.93243
published_at 2026-04-16T12:55:00Z
11
value 0.10442
scoring_system epss
scoring_elements 0.93248
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-6097
8
reference_url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=216937
reference_id
reference_type
scores
url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=216937
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6097
10
reference_url http://secunia.com/advisories/23115
reference_id
reference_type
scores
url http://secunia.com/advisories/23115
11
reference_url http://secunia.com/advisories/23117
reference_id
reference_type
scores
url http://secunia.com/advisories/23117
12
reference_url http://secunia.com/advisories/23142
reference_id
reference_type
scores
url http://secunia.com/advisories/23142
13
reference_url http://secunia.com/advisories/23146
reference_id
reference_type
scores
url http://secunia.com/advisories/23146
14
reference_url http://secunia.com/advisories/23163
reference_id
reference_type
scores
url http://secunia.com/advisories/23163
15
reference_url http://secunia.com/advisories/23173
reference_id
reference_type
scores
url http://secunia.com/advisories/23173
16
reference_url http://secunia.com/advisories/23198
reference_id
reference_type
scores
url http://secunia.com/advisories/23198
17
reference_url http://secunia.com/advisories/23209
reference_id
reference_type
scores
url http://secunia.com/advisories/23209
18
reference_url http://secunia.com/advisories/23314
reference_id
reference_type
scores
url http://secunia.com/advisories/23314
19
reference_url http://secunia.com/advisories/23443
reference_id
reference_type
scores
url http://secunia.com/advisories/23443
20
reference_url http://secunia.com/advisories/23514
reference_id
reference_type
scores
url http://secunia.com/advisories/23514
21
reference_url http://secunia.com/advisories/23911
reference_id
reference_type
scores
url http://secunia.com/advisories/23911
22
reference_url http://secunia.com/advisories/24479
reference_id
reference_type
scores
url http://secunia.com/advisories/24479
23
reference_url http://secunia.com/advisories/24636
reference_id
reference_type
scores
url http://secunia.com/advisories/24636
24
reference_url http://security.freebsd.org/advisories/FreeBSD-SA-06:26.gtar.asc
reference_id
reference_type
scores
url http://security.freebsd.org/advisories/FreeBSD-SA-06:26.gtar.asc
25
reference_url http://security.gentoo.org/glsa/glsa-200612-10.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200612-10.xml
26
reference_url http://securityreason.com/securityalert/1918
reference_id
reference_type
scores
url http://securityreason.com/securityalert/1918
27
reference_url http://securitytracker.com/id?1017423
reference_id
reference_type
scores
url http://securitytracker.com/id?1017423
28
reference_url https://issues.rpath.com/browse/RPL-821
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-821
29
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.469379
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.469379
30
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10963
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10963
31
reference_url http://support.avaya.com/elmodocs2/security/ASA-2007-015.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2007-015.htm
32
reference_url http://www.debian.org/security/2006/dsa-1223
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-1223
33
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:219
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:219
34
reference_url http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.038.html
reference_id
reference_type
scores
url http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.038.html
35
reference_url http://www.securityfocus.com/archive/1/453286/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/453286/100/0/threaded
36
reference_url http://www.securityfocus.com/archive/1/464268/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464268/100/0/threaded
37
reference_url http://www.securityfocus.com/bid/21235
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/21235
38
reference_url http://www.trustix.org/errata/2006/0068/
reference_id
reference_type
scores
url http://www.trustix.org/errata/2006/0068/
39
reference_url http://www.ubuntu.com/usn/usn-385-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-385-1
40
reference_url http://www.us-cert.gov/cas/techalerts/TA07-072A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA07-072A.html
41
reference_url http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html
reference_id
reference_type
scores
url http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html
42
reference_url http://www.vupen.com/english/advisories/2006/4717
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/4717
43
reference_url http://www.vupen.com/english/advisories/2006/5102
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/5102
44
reference_url http://www.vupen.com/english/advisories/2007/0930
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0930
45
reference_url http://www.vupen.com/english/advisories/2007/1171
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1171
46
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618237
reference_id 1618237
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618237
47
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=399845
reference_id 399845
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=399845
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:tar:1.15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:tar:1.15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:tar:1.15.1:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:tar:1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:tar:1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:tar:1.16:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2006-6097
reference_id CVE-2006-6097
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:N/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2006-6097
51
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/29160.c
reference_id CVE-2006-6097;OSVDB-30721
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/29160.c
52
reference_url https://www.securityfocus.com/bid/21235/info
reference_id CVE-2006-6097;OSVDB-30721
reference_type exploit
scores
url https://www.securityfocus.com/bid/21235/info
53
reference_url https://security.gentoo.org/glsa/200612-10
reference_id GLSA-200612-10
reference_type
scores
url https://security.gentoo.org/glsa/200612-10
54
reference_url https://access.redhat.com/errata/RHSA-2006:0749
reference_id RHSA-2006:0749
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0749
55
reference_url https://usn.ubuntu.com/385-1/
reference_id USN-385-1
reference_type
scores
url https://usn.ubuntu.com/385-1/
fixed_packages
0
url pkg:deb/debian/tar@1.16-2?distro=trixie
purl pkg:deb/debian/tar@1.16-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tar@1.16-2%3Fdistro=trixie
1
url pkg:deb/debian/tar@1.34%2Bdfsg-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/tar@1.34%2Bdfsg-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tar@1.34%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/tar@1.34%2Bdfsg-1.2%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/tar@1.34%2Bdfsg-1.2%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tar@1.34%252Bdfsg-1.2%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/tar@1.35%2Bdfsg-3.1?distro=trixie
purl pkg:deb/debian/tar@1.35%2Bdfsg-3.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tar@1.35%252Bdfsg-3.1%3Fdistro=trixie
4
url pkg:deb/debian/tar@1.35%2Bdfsg-4?distro=trixie
purl pkg:deb/debian/tar@1.35%2Bdfsg-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tar@1.35%252Bdfsg-4%3Fdistro=trixie
aliases CVE-2006-6097
risk_score 7.2
exploitability 2.0
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zn6w-f898-tqgd
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/tar@1.16-2%3Fdistro=trixie