Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie
Typedeb
Namespacedebian
Namezlib
Version1:1.2.13.dfsg-1
Qualifiers
distro trixie
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1:1.3.dfsg-2
Latest_non_vulnerable_version1:1.3.dfsg+really1.3.2-3
Affected_by_vulnerabilities
0
url VCID-ac5e-emja-v3fe
vulnerability_id VCID-ac5e-emja-v3fe
summary zlib: zlib: Denial of Service via infinite loop in CRC32 combine functions
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27171.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27171.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-27171
reference_id
reference_type
scores
0
value 7e-05
scoring_system epss
scoring_elements 0.00612
published_at 2026-04-16T12:55:00Z
1
value 7e-05
scoring_system epss
scoring_elements 0.00633
published_at 2026-04-02T12:55:00Z
2
value 7e-05
scoring_system epss
scoring_elements 0.00626
published_at 2026-04-04T12:55:00Z
3
value 7e-05
scoring_system epss
scoring_elements 0.00629
published_at 2026-04-07T12:55:00Z
4
value 7e-05
scoring_system epss
scoring_elements 0.00627
published_at 2026-04-08T12:55:00Z
5
value 7e-05
scoring_system epss
scoring_elements 0.00621
published_at 2026-04-09T12:55:00Z
6
value 7e-05
scoring_system epss
scoring_elements 0.0062
published_at 2026-04-11T12:55:00Z
7
value 7e-05
scoring_system epss
scoring_elements 0.00616
published_at 2026-04-12T12:55:00Z
8
value 7e-05
scoring_system epss
scoring_elements 0.00618
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-27171
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27171
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1128336
reference_id 1128336
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1128336
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2440530
reference_id 2440530
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2440530
6
reference_url https://github.com/madler/zlib/issues/904
reference_id 904
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-18T13:35:50Z/
url https://github.com/madler/zlib/issues/904
7
reference_url https://7asecurity.com/reports/pentest-report-zlib-RC1.1.pdf
reference_id pentest-report-zlib-RC1.1.pdf
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-18T13:35:50Z/
url https://7asecurity.com/reports/pentest-report-zlib-RC1.1.pdf
8
reference_url https://github.com/madler/zlib/releases/tag/v1.3.2
reference_id v1.3.2
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-18T13:35:50Z/
url https://github.com/madler/zlib/releases/tag/v1.3.2
9
reference_url https://7asecurity.com/blog/2026/02/zlib-7asecurity-audit/
reference_id zlib-7asecurity-audit
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-18T13:35:50Z/
url https://7asecurity.com/blog/2026/02/zlib-7asecurity-audit/
10
reference_url https://ostif.org/zlib-audit-complete/
reference_id zlib-audit-complete
reference_type
scores
0
value 2.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-18T13:35:50Z/
url https://ostif.org/zlib-audit-complete/
fixed_packages
0
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-1?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.2-1%3Fdistro=trixie
1
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.2-3%3Fdistro=trixie
aliases CVE-2026-27171
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ac5e-emja-v3fe
1
url VCID-v6pc-48dg-4kad
vulnerability_id VCID-v6pc-48dg-4kad
summary
Integer Overflow or Wraparound
MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45853.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45853.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-45853
reference_id
reference_type
scores
0
value 0.01287
scoring_system epss
scoring_elements 0.79629
published_at 2026-04-13T12:55:00Z
1
value 0.01287
scoring_system epss
scoring_elements 0.79659
published_at 2026-04-18T12:55:00Z
2
value 0.01287
scoring_system epss
scoring_elements 0.79631
published_at 2026-04-09T12:55:00Z
3
value 0.01287
scoring_system epss
scoring_elements 0.79652
published_at 2026-04-11T12:55:00Z
4
value 0.01287
scoring_system epss
scoring_elements 0.79636
published_at 2026-04-12T12:55:00Z
5
value 0.01322
scoring_system epss
scoring_elements 0.79841
published_at 2026-04-02T12:55:00Z
6
value 0.01322
scoring_system epss
scoring_elements 0.79879
published_at 2026-04-08T12:55:00Z
7
value 0.01322
scoring_system epss
scoring_elements 0.7985
published_at 2026-04-07T12:55:00Z
8
value 0.01322
scoring_system epss
scoring_elements 0.79863
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-45853
2
reference_url https://chromium.googlesource.com/chromium/src/+/d709fb23806858847131027da95ef4c548813356
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:37Z/
url https://chromium.googlesource.com/chromium/src/+/d709fb23806858847131027da95ef4c548813356
3
reference_url https://chromium.googlesource.com/chromium/src/+/de29dd6c7151d3cd37cb4cf0036800ddfb1d8b61
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:37Z/
url https://chromium.googlesource.com/chromium/src/+/de29dd6c7151d3cd37cb4cf0036800ddfb1d8b61
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45853
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45853
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/madler/zlib/blob/ac8f12c97d1afd9bafa9c710f827d40a407d3266/contrib/README.contrib#L1-L4
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:37Z/
url https://github.com/madler/zlib/blob/ac8f12c97d1afd9bafa9c710f827d40a407d3266/contrib/README.contrib#L1-L4
7
reference_url https://github.com/madler/zlib/commit/73331a6a0481067628f065ffe87bb1d8f787d10c
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/madler/zlib/commit/73331a6a0481067628f065ffe87bb1d8f787d10c
8
reference_url https://github.com/madler/zlib/pull/843
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:37Z/
url https://github.com/madler/zlib/pull/843
9
reference_url https://github.com/smihica/pyminizip
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/smihica/pyminizip
10
reference_url https://github.com/smihica/pyminizip/blob/master/zlib-1.2.11/contrib/minizip/zip.c
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/smihica/pyminizip/blob/master/zlib-1.2.11/contrib/minizip/zip.c
11
reference_url https://lists.debian.org/debian-lts-announce/2023/11/msg00026.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:37Z/
url https://lists.debian.org/debian-lts-announce/2023/11/msg00026.html
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-45853
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-45853
13
reference_url https://pypi.org/project/pyminizip/#history
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:37Z/
url https://pypi.org/project/pyminizip/#history
14
reference_url https://security.gentoo.org/glsa/202401-18
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:37Z/
url https://security.gentoo.org/glsa/202401-18
15
reference_url https://security.netapp.com/advisory/ntap-20231130-0009
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20231130-0009
16
reference_url https://security.netapp.com/advisory/ntap-20231130-0009/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:37Z/
url https://security.netapp.com/advisory/ntap-20231130-0009/
17
reference_url https://www.winimage.com/zLibDll/minizip.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:37Z/
url https://www.winimage.com/zLibDll/minizip.html
18
reference_url http://www.openwall.com/lists/oss-security/2023/10/20/9
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:37Z/
url http://www.openwall.com/lists/oss-security/2023/10/20/9
19
reference_url http://www.openwall.com/lists/oss-security/2024/01/24/10
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:37Z/
url http://www.openwall.com/lists/oss-security/2024/01/24/10
20
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054290
reference_id 1054290
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054290
21
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056718
reference_id 1056718
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056718
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2244556
reference_id 2244556
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2244556
23
reference_url https://security.archlinux.org/AVG-2847
reference_id AVG-2847
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2847
24
reference_url https://github.com/advisories/GHSA-mq29-j5xf-cjwr
reference_id GHSA-mq29-j5xf-cjwr
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-mq29-j5xf-cjwr
25
reference_url https://access.redhat.com/errata/RHSA-2023:7626
reference_id RHSA-2023:7626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7626
26
reference_url https://usn.ubuntu.com/7107-1/
reference_id USN-7107-1
reference_type
scores
url https://usn.ubuntu.com/7107-1/
fixed_packages
0
url pkg:deb/debian/zlib@1:1.3.dfsg-2?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg-2%3Fdistro=trixie
1
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-1%3Fdistro=trixie
2
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-3%3Fdistro=trixie
3
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.2-3%3Fdistro=trixie
aliases CVE-2023-45853, GHSA-mq29-j5xf-cjwr
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v6pc-48dg-4kad
Fixing_vulnerabilities
0
url VCID-1vu9-xzw9-kfe2
vulnerability_id VCID-1vu9-xzw9-kfe2
summary zlib DoS
references
0
reference_url ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:16.zlib.asc
reference_id
reference_type
scores
url ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:16.zlib.asc
1
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.6/SCOSA-2006.6.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.6/SCOSA-2006.6.txt
2
reference_url http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
3
reference_url http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
4
reference_url http://lists.apple.com/archives/security-announce//2008/Nov/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce//2008/Nov/msg00001.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2096.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2096.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-2096
reference_id
reference_type
scores
0
value 0.43032
scoring_system epss
scoring_elements 0.975
published_at 2026-04-18T12:55:00Z
1
value 0.43032
scoring_system epss
scoring_elements 0.97466
published_at 2026-04-01T12:55:00Z
2
value 0.43032
scoring_system epss
scoring_elements 0.97473
published_at 2026-04-02T12:55:00Z
3
value 0.43032
scoring_system epss
scoring_elements 0.97476
published_at 2026-04-04T12:55:00Z
4
value 0.43032
scoring_system epss
scoring_elements 0.97477
published_at 2026-04-07T12:55:00Z
5
value 0.43032
scoring_system epss
scoring_elements 0.97483
published_at 2026-04-08T12:55:00Z
6
value 0.43032
scoring_system epss
scoring_elements 0.97484
published_at 2026-04-09T12:55:00Z
7
value 0.43032
scoring_system epss
scoring_elements 0.97487
published_at 2026-04-11T12:55:00Z
8
value 0.43032
scoring_system epss
scoring_elements 0.97489
published_at 2026-04-12T12:55:00Z
9
value 0.43032
scoring_system epss
scoring_elements 0.9749
published_at 2026-04-13T12:55:00Z
10
value 0.43032
scoring_system epss
scoring_elements 0.97497
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-2096
7
reference_url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162391
reference_id
reference_type
scores
url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162391
8
reference_url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162680
reference_id
reference_type
scores
url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162680
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2096
10
reference_url http://secunia.com/advisories/15949
reference_id
reference_type
scores
url http://secunia.com/advisories/15949
11
reference_url http://secunia.com/advisories/17054
reference_id
reference_type
scores
url http://secunia.com/advisories/17054
12
reference_url http://secunia.com/advisories/17225
reference_id
reference_type
scores
url http://secunia.com/advisories/17225
13
reference_url http://secunia.com/advisories/17236
reference_id
reference_type
scores
url http://secunia.com/advisories/17236
14
reference_url http://secunia.com/advisories/17326
reference_id
reference_type
scores
url http://secunia.com/advisories/17326
15
reference_url http://secunia.com/advisories/17516
reference_id
reference_type
scores
url http://secunia.com/advisories/17516
16
reference_url http://secunia.com/advisories/18377
reference_id
reference_type
scores
url http://secunia.com/advisories/18377
17
reference_url http://secunia.com/advisories/18406
reference_id
reference_type
scores
url http://secunia.com/advisories/18406
18
reference_url http://secunia.com/advisories/18507
reference_id
reference_type
scores
url http://secunia.com/advisories/18507
19
reference_url http://secunia.com/advisories/19550
reference_id
reference_type
scores
url http://secunia.com/advisories/19550
20
reference_url http://secunia.com/advisories/19597
reference_id
reference_type
scores
url http://secunia.com/advisories/19597
21
reference_url http://secunia.com/advisories/24788
reference_id
reference_type
scores
url http://secunia.com/advisories/24788
22
reference_url http://secunia.com/advisories/31492
reference_id
reference_type
scores
url http://secunia.com/advisories/31492
23
reference_url http://secunia.com/advisories/32706
reference_id
reference_type
scores
url http://secunia.com/advisories/32706
24
reference_url http://security.gentoo.org/glsa/glsa-200507-05.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200507-05.xml
25
reference_url http://securitytracker.com/id?1014398
reference_id
reference_type
scores
url http://securitytracker.com/id?1014398
26
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/24064
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/24064
27
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11500
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11500
28
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1262
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1262
29
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1542
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1542
30
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-26-101989-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-26-101989-1
31
reference_url http://support.apple.com/kb/HT3298
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3298
32
reference_url http://support.avaya.com/elmodocs2/security/ASA-2006-016.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2006-016.htm
33
reference_url http://www.debian.org/security/2005/dsa-740
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-740
34
reference_url http://www.debian.org/security/2005/dsa-797
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-797
35
reference_url http://www.debian.org/security/2006/dsa-1026
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-1026
36
reference_url http://www.gentoo.org/security/en/glsa/glsa-200509-18.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200509-18.xml
37
reference_url http://www.kb.cert.org/vuls/id/680620
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/680620
38
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:112
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:112
39
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:196
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:196
40
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:070
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:070
41
reference_url http://www.redhat.com/support/errata/RHSA-2005-569.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-569.html
42
reference_url http://www.redhat.com/support/errata/RHSA-2008-0629.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0629.html
43
reference_url http://www.securityfocus.com/archive/1/421411/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/421411/100/0/threaded
44
reference_url http://www.securityfocus.com/archive/1/464745/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464745/100/0/threaded
45
reference_url http://www.securityfocus.com/archive/1/482503/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/482503/100/0/threaded
46
reference_url http://www.securityfocus.com/archive/1/482505/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/482505/100/0/threaded
47
reference_url http://www.securityfocus.com/archive/1/482571/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/482571/100/0/threaded
48
reference_url http://www.securityfocus.com/archive/1/482601/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/482601/100/0/threaded
49
reference_url http://www.securityfocus.com/archive/1/482949/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/482949/100/0/threaded
50
reference_url http://www.securityfocus.com/archive/1/482950/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/482950/100/0/threaded
51
reference_url http://www.securityfocus.com/bid/14162
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/14162
52
reference_url http://www.ubuntulinux.org/usn/usn-151-3
reference_id
reference_type
scores
url http://www.ubuntulinux.org/usn/usn-151-3
53
reference_url http://www.vmware.com/support/vi3/doc/esx-3616065-patch.html
reference_id
reference_type
scores
url http://www.vmware.com/support/vi3/doc/esx-3616065-patch.html
54
reference_url http://www.vmware.com/support/vi3/doc/esx-9916286-patch.html
reference_id
reference_type
scores
url http://www.vmware.com/support/vi3/doc/esx-9916286-patch.html
55
reference_url http://www.vupen.com/english/advisories/2005/0978
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/0978
56
reference_url http://www.vupen.com/english/advisories/2006/0144
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2006/0144
57
reference_url http://www.vupen.com/english/advisories/2007/1267
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1267
58
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317133
reference_id 317133
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317133
59
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317523
reference_id 317523
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317523
60
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317966
reference_id 317966
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317966
61
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317967
reference_id 317967
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317967
62
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317968
reference_id 317968
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317968
63
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318014
reference_id 318014
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318014
64
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318069
reference_id 318069
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318069
65
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318091
reference_id 318091
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318091
66
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318099
reference_id 318099
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318099
67
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318100
reference_id 318100
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318100
68
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=332236
reference_id 332236
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=332236
69
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=430650
reference_id 430650
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=430650
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zlib:zlib:1.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:zlib:zlib:1.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zlib:zlib:1.2.0:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zlib:zlib:1.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:zlib:zlib:1.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zlib:zlib:1.2.1:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zlib:zlib:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:zlib:zlib:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zlib:zlib:1.2.2:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-2096
reference_id CVE-2005-2096
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-2096
74
reference_url https://access.redhat.com/errata/RHSA-2005:569
reference_id RHSA-2005:569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:569
75
reference_url https://access.redhat.com/errata/RHSA-2008:0264
reference_id RHSA-2008:0264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0264
76
reference_url https://access.redhat.com/errata/RHSA-2008:0525
reference_id RHSA-2008:0525
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0525
77
reference_url https://access.redhat.com/errata/RHSA-2008:0629
reference_id RHSA-2008:0629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0629
78
reference_url https://usn.ubuntu.com/148-1/
reference_id USN-148-1
reference_type
scores
url https://usn.ubuntu.com/148-1/
79
reference_url https://usn.ubuntu.com/151-2/
reference_id USN-151-2
reference_type
scores
url https://usn.ubuntu.com/151-2/
80
reference_url https://usn.ubuntu.com/151-3/
reference_id USN-151-3
reference_type
scores
url https://usn.ubuntu.com/151-3/
81
reference_url https://usn.ubuntu.com/151-4/
reference_id USN-151-4
reference_type
scores
url https://usn.ubuntu.com/151-4/
fixed_packages
0
url pkg:deb/debian/zlib@1:1.2.2-7?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.2-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.2-7%3Fdistro=trixie
1
url pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
1
vulnerability VCID-v6pc-48dg-4kad
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.11.dfsg-2%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
1
vulnerability VCID-v6pc-48dg-4kad
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.13.dfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-1%3Fdistro=trixie
4
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-3%3Fdistro=trixie
5
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.2-3%3Fdistro=trixie
aliases CVE-2005-2096
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1vu9-xzw9-kfe2
1
url VCID-3aq8-fkrc-hqa2
vulnerability_id VCID-3aq8-fkrc-hqa2
summary zlib: zlib: Arbitrary code execution via buffer overflow in untgz utility
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22184.json
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22184.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-22184
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04137
published_at 2026-04-02T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04161
published_at 2026-04-13T12:55:00Z
2
value 0.00017
scoring_system epss
scoring_elements 0.04186
published_at 2026-04-12T12:55:00Z
3
value 0.00017
scoring_system epss
scoring_elements 0.04203
published_at 2026-04-11T12:55:00Z
4
value 0.00017
scoring_system epss
scoring_elements 0.04221
published_at 2026-04-09T12:55:00Z
5
value 0.00017
scoring_system epss
scoring_elements 0.04206
published_at 2026-04-08T12:55:00Z
6
value 0.00017
scoring_system epss
scoring_elements 0.04157
published_at 2026-04-04T12:55:00Z
7
value 0.00017
scoring_system epss
scoring_elements 0.04175
published_at 2026-04-07T12:55:00Z
8
value 6e-05
scoring_system epss
scoring_elements 0.00425
published_at 2026-04-18T12:55:00Z
9
value 6e-05
scoring_system epss
scoring_elements 0.00421
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-22184
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22184
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22184
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2427688
reference_id 2427688
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2427688
5
reference_url https://seclists.org/fulldisclosure/2026/Jan/3
reference_id 3
reference_type
scores
0
value 4.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-01-07T21:17:54Z/
url https://seclists.org/fulldisclosure/2026/Jan/3
6
reference_url https://github.com/madler/zlib
reference_id zlib
reference_type
scores
0
value 4.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-01-07T21:17:54Z/
url https://github.com/madler/zlib
7
reference_url https://zlib.net/
reference_id zlib.net
reference_type
scores
0
value 4.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-01-07T21:17:54Z/
url https://zlib.net/
8
reference_url https://www.vulncheck.com/advisories/zlib-untgz-global-buffer-overflow-in-tgzfname
reference_id zlib-untgz-global-buffer-overflow-in-tgzfname
reference_type
scores
0
value 4.6
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-01-07T21:17:54Z/
url https://www.vulncheck.com/advisories/zlib-untgz-global-buffer-overflow-in-tgzfname
fixed_packages
0
url pkg:deb/debian/zlib@1:1.2.6.dfsg-1?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.6.dfsg-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.6.dfsg-1%3Fdistro=trixie
1
url pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
1
vulnerability VCID-v6pc-48dg-4kad
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.11.dfsg-2%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
1
vulnerability VCID-v6pc-48dg-4kad
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.13.dfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-1%3Fdistro=trixie
4
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-3%3Fdistro=trixie
5
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.2-3%3Fdistro=trixie
aliases CVE-2026-22184
risk_score 3.9
exploitability 0.5
weighted_severity 7.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3aq8-fkrc-hqa2
2
url VCID-eyjp-7kks-jbfr
vulnerability_id VCID-eyjp-7kks-jbfr
summary
Multiple vulnerabilities have been found in rsync, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9841.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9841.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9841
reference_id
reference_type
scores
0
value 0.13495
scoring_system epss
scoring_elements 0.94234
published_at 2026-04-18T12:55:00Z
1
value 0.13495
scoring_system epss
scoring_elements 0.94204
published_at 2026-04-08T12:55:00Z
2
value 0.13495
scoring_system epss
scoring_elements 0.94208
published_at 2026-04-09T12:55:00Z
3
value 0.13495
scoring_system epss
scoring_elements 0.94213
published_at 2026-04-12T12:55:00Z
4
value 0.13495
scoring_system epss
scoring_elements 0.94214
published_at 2026-04-13T12:55:00Z
5
value 0.13495
scoring_system epss
scoring_elements 0.94229
published_at 2026-04-16T12:55:00Z
6
value 0.20281
scoring_system epss
scoring_elements 0.95479
published_at 2026-04-01T12:55:00Z
7
value 0.20281
scoring_system epss
scoring_elements 0.95488
published_at 2026-04-02T12:55:00Z
8
value 0.20281
scoring_system epss
scoring_elements 0.95494
published_at 2026-04-04T12:55:00Z
9
value 0.20848
scoring_system epss
scoring_elements 0.95599
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9841
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9841
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1402346
reference_id 1402346
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1402346
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=847270
reference_id 847270
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=847270
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924509
reference_id 924509
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924509
7
reference_url https://security.gentoo.org/glsa/201701-56
reference_id GLSA-201701-56
reference_type
scores
url https://security.gentoo.org/glsa/201701-56
8
reference_url https://security.gentoo.org/glsa/202007-54
reference_id GLSA-202007-54
reference_type
scores
url https://security.gentoo.org/glsa/202007-54
9
reference_url https://access.redhat.com/errata/RHSA-2017:1220
reference_id RHSA-2017:1220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1220
10
reference_url https://access.redhat.com/errata/RHSA-2017:1221
reference_id RHSA-2017:1221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1221
11
reference_url https://access.redhat.com/errata/RHSA-2017:1222
reference_id RHSA-2017:1222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1222
12
reference_url https://access.redhat.com/errata/RHSA-2017:2999
reference_id RHSA-2017:2999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2999
13
reference_url https://access.redhat.com/errata/RHSA-2017:3046
reference_id RHSA-2017:3046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3046
14
reference_url https://access.redhat.com/errata/RHSA-2017:3047
reference_id RHSA-2017:3047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3047
15
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3453
16
reference_url https://usn.ubuntu.com/4246-1/
reference_id USN-4246-1
reference_type
scores
url https://usn.ubuntu.com/4246-1/
17
reference_url https://usn.ubuntu.com/4292-1/
reference_id USN-4292-1
reference_type
scores
url https://usn.ubuntu.com/4292-1/
18
reference_url https://usn.ubuntu.com/6736-1/
reference_id USN-6736-1
reference_type
scores
url https://usn.ubuntu.com/6736-1/
19
reference_url https://usn.ubuntu.com/6736-2/
reference_id USN-6736-2
reference_type
scores
url https://usn.ubuntu.com/6736-2/
fixed_packages
0
url pkg:deb/debian/zlib@1:1.2.8.dfsg-4?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.8.dfsg-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.8.dfsg-4%3Fdistro=trixie
1
url pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
1
vulnerability VCID-v6pc-48dg-4kad
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.11.dfsg-2%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
1
vulnerability VCID-v6pc-48dg-4kad
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.13.dfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-1%3Fdistro=trixie
4
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-3%3Fdistro=trixie
5
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.2-3%3Fdistro=trixie
aliases CVE-2016-9841
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eyjp-7kks-jbfr
3
url VCID-m6xx-a91r-sbhu
vulnerability_id VCID-m6xx-a91r-sbhu
summary
Multiple vulnerabilities have been found in rsync, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9842.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9842.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9842
reference_id
reference_type
scores
0
value 0.12133
scoring_system epss
scoring_elements 0.93832
published_at 2026-04-16T12:55:00Z
1
value 0.12133
scoring_system epss
scoring_elements 0.93804
published_at 2026-04-09T12:55:00Z
2
value 0.12133
scoring_system epss
scoring_elements 0.9377
published_at 2026-04-01T12:55:00Z
3
value 0.12133
scoring_system epss
scoring_elements 0.93837
published_at 2026-04-18T12:55:00Z
4
value 0.12133
scoring_system epss
scoring_elements 0.93809
published_at 2026-04-13T12:55:00Z
5
value 0.12133
scoring_system epss
scoring_elements 0.93801
published_at 2026-04-08T12:55:00Z
6
value 0.12133
scoring_system epss
scoring_elements 0.93793
published_at 2026-04-07T12:55:00Z
7
value 0.12133
scoring_system epss
scoring_elements 0.93789
published_at 2026-04-04T12:55:00Z
8
value 0.12133
scoring_system epss
scoring_elements 0.93779
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9842
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9842
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1402348
reference_id 1402348
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=1402348
5
reference_url http://www.openwall.com/lists/oss-security/2016/12/05/21
reference_id 21
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/
url http://www.openwall.com/lists/oss-security/2016/12/05/21
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=847274
reference_id 847274
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=847274
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924509
reference_id 924509
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924509
8
reference_url http://www.securityfocus.com/bid/95131
reference_id 95131
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/
url http://www.securityfocus.com/bid/95131
9
reference_url https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib
reference_id Completed#zlib
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/
url https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib
10
reference_url https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958
reference_id e54e1299404101a5a9d0cf5e45512b543967f958
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/
url https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958
11
reference_url https://security.gentoo.org/glsa/201701-56
reference_id GLSA-201701-56
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/
url https://security.gentoo.org/glsa/201701-56
12
reference_url https://security.gentoo.org/glsa/202007-54
reference_id GLSA-202007-54
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/
url https://security.gentoo.org/glsa/202007-54
13
reference_url https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html
reference_id msg00027.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/
url https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html
14
reference_url https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html
reference_id msg00030.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/
url https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html
15
reference_url http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html
reference_id msg00050.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/
url http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html
16
reference_url http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html
reference_id msg00053.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/
url http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html
17
reference_url http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html
reference_id msg00127.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/
url http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html
18
reference_url https://access.redhat.com/errata/RHSA-2017:1220
reference_id RHSA-2017:1220
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/
url https://access.redhat.com/errata/RHSA-2017:1220
19
reference_url https://access.redhat.com/errata/RHSA-2017:1221
reference_id RHSA-2017:1221
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/
url https://access.redhat.com/errata/RHSA-2017:1221
20
reference_url https://access.redhat.com/errata/RHSA-2017:1222
reference_id RHSA-2017:1222
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/
url https://access.redhat.com/errata/RHSA-2017:1222
21
reference_url https://access.redhat.com/errata/RHSA-2017:2999
reference_id RHSA-2017:2999
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/
url https://access.redhat.com/errata/RHSA-2017:2999
22
reference_url https://access.redhat.com/errata/RHSA-2017:3046
reference_id RHSA-2017:3046
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/
url https://access.redhat.com/errata/RHSA-2017:3046
23
reference_url https://access.redhat.com/errata/RHSA-2017:3047
reference_id RHSA-2017:3047
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/
url https://access.redhat.com/errata/RHSA-2017:3047
24
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/
url https://access.redhat.com/errata/RHSA-2017:3453
25
reference_url https://usn.ubuntu.com/4246-1/
reference_id USN-4246-1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/
url https://usn.ubuntu.com/4246-1/
26
reference_url https://usn.ubuntu.com/4292-1/
reference_id USN-4292-1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/
url https://usn.ubuntu.com/4292-1/
27
reference_url https://wiki.mozilla.org/images/0/09/Zlib-report.pdf
reference_id Zlib-report.pdf
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/
url https://wiki.mozilla.org/images/0/09/Zlib-report.pdf
fixed_packages
0
url pkg:deb/debian/zlib@1:1.2.8.dfsg-3?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.8.dfsg-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.8.dfsg-3%3Fdistro=trixie
1
url pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
1
vulnerability VCID-v6pc-48dg-4kad
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.11.dfsg-2%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
1
vulnerability VCID-v6pc-48dg-4kad
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.13.dfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-1%3Fdistro=trixie
4
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-3%3Fdistro=trixie
5
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.2-3%3Fdistro=trixie
aliases CVE-2016-9842
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m6xx-a91r-sbhu
4
url VCID-mr6h-6jrp-gyf3
vulnerability_id VCID-mr6h-6jrp-gyf3
summary
Multiple vulnerabilities have been found in rsync, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9840.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9840.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9840
reference_id
reference_type
scores
0
value 0.13004
scoring_system epss
scoring_elements 0.94041
published_at 2026-04-01T12:55:00Z
1
value 0.13004
scoring_system epss
scoring_elements 0.94102
published_at 2026-04-18T12:55:00Z
2
value 0.13004
scoring_system epss
scoring_elements 0.94081
published_at 2026-04-13T12:55:00Z
3
value 0.13004
scoring_system epss
scoring_elements 0.94097
published_at 2026-04-16T12:55:00Z
4
value 0.13004
scoring_system epss
scoring_elements 0.9405
published_at 2026-04-02T12:55:00Z
5
value 0.13004
scoring_system epss
scoring_elements 0.9406
published_at 2026-04-04T12:55:00Z
6
value 0.13004
scoring_system epss
scoring_elements 0.94064
published_at 2026-04-07T12:55:00Z
7
value 0.13004
scoring_system epss
scoring_elements 0.94072
published_at 2026-04-08T12:55:00Z
8
value 0.13004
scoring_system epss
scoring_elements 0.94076
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9840
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9840
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9840
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1402345
reference_id 1402345
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1402345
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=847270
reference_id 847270
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=847270
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924509
reference_id 924509
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924509
7
reference_url https://security.gentoo.org/glsa/201701-56
reference_id GLSA-201701-56
reference_type
scores
url https://security.gentoo.org/glsa/201701-56
8
reference_url https://security.gentoo.org/glsa/202007-54
reference_id GLSA-202007-54
reference_type
scores
url https://security.gentoo.org/glsa/202007-54
9
reference_url https://access.redhat.com/errata/RHSA-2017:1220
reference_id RHSA-2017:1220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1220
10
reference_url https://access.redhat.com/errata/RHSA-2017:1221
reference_id RHSA-2017:1221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1221
11
reference_url https://access.redhat.com/errata/RHSA-2017:1222
reference_id RHSA-2017:1222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1222
12
reference_url https://access.redhat.com/errata/RHSA-2017:2999
reference_id RHSA-2017:2999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2999
13
reference_url https://access.redhat.com/errata/RHSA-2017:3046
reference_id RHSA-2017:3046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3046
14
reference_url https://access.redhat.com/errata/RHSA-2017:3047
reference_id RHSA-2017:3047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3047
15
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3453
16
reference_url https://access.redhat.com/errata/RHSA-2025:10541
reference_id RHSA-2025:10541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10541
17
reference_url https://access.redhat.com/errata/RHSA-2025:11048
reference_id RHSA-2025:11048
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:11048
18
reference_url https://access.redhat.com/errata/RHSA-2025:12013
reference_id RHSA-2025:12013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12013
19
reference_url https://access.redhat.com/errata/RHSA-2025:13947
reference_id RHSA-2025:13947
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13947
20
reference_url https://access.redhat.com/errata/RHSA-2025:8284
reference_id RHSA-2025:8284
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8284
21
reference_url https://access.redhat.com/errata/RHSA-2025:8314
reference_id RHSA-2025:8314
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8314
22
reference_url https://access.redhat.com/errata/RHSA-2025:8395
reference_id RHSA-2025:8395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8395
23
reference_url https://usn.ubuntu.com/4246-1/
reference_id USN-4246-1
reference_type
scores
url https://usn.ubuntu.com/4246-1/
24
reference_url https://usn.ubuntu.com/4292-1/
reference_id USN-4292-1
reference_type
scores
url https://usn.ubuntu.com/4292-1/
25
reference_url https://usn.ubuntu.com/6736-1/
reference_id USN-6736-1
reference_type
scores
url https://usn.ubuntu.com/6736-1/
26
reference_url https://usn.ubuntu.com/6736-2/
reference_id USN-6736-2
reference_type
scores
url https://usn.ubuntu.com/6736-2/
fixed_packages
0
url pkg:deb/debian/zlib@1:1.2.8.dfsg-3?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.8.dfsg-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.8.dfsg-3%3Fdistro=trixie
1
url pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
1
vulnerability VCID-v6pc-48dg-4kad
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.11.dfsg-2%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
1
vulnerability VCID-v6pc-48dg-4kad
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.13.dfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-1%3Fdistro=trixie
4
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-3%3Fdistro=trixie
5
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.2-3%3Fdistro=trixie
aliases CVE-2016-9840
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mr6h-6jrp-gyf3
5
url VCID-s8dx-tft2-nfg6
vulnerability_id VCID-s8dx-tft2-nfg6
summary The zlib library contains a Denial of Service vulnerability.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0797
reference_id
reference_type
scores
0
value 0.02112
scoring_system epss
scoring_elements 0.84042
published_at 2026-04-01T12:55:00Z
1
value 0.02112
scoring_system epss
scoring_elements 0.84055
published_at 2026-04-02T12:55:00Z
2
value 0.02112
scoring_system epss
scoring_elements 0.84072
published_at 2026-04-04T12:55:00Z
3
value 0.02112
scoring_system epss
scoring_elements 0.84073
published_at 2026-04-07T12:55:00Z
4
value 0.02112
scoring_system epss
scoring_elements 0.84097
published_at 2026-04-08T12:55:00Z
5
value 0.02112
scoring_system epss
scoring_elements 0.84103
published_at 2026-04-09T12:55:00Z
6
value 0.02112
scoring_system epss
scoring_elements 0.8412
published_at 2026-04-11T12:55:00Z
7
value 0.02112
scoring_system epss
scoring_elements 0.84115
published_at 2026-04-12T12:55:00Z
8
value 0.02112
scoring_system epss
scoring_elements 0.8411
published_at 2026-04-13T12:55:00Z
9
value 0.02112
scoring_system epss
scoring_elements 0.84133
published_at 2026-04-16T12:55:00Z
10
value 0.02112
scoring_system epss
scoring_elements 0.84134
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0797
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0797
2
reference_url https://security.gentoo.org/glsa/200408-26
reference_id GLSA-200408-26
reference_type
scores
url https://security.gentoo.org/glsa/200408-26
fixed_packages
0
url pkg:deb/debian/zlib@1:1.2.1.1-6?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.1.1-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.1.1-6%3Fdistro=trixie
1
url pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
1
vulnerability VCID-v6pc-48dg-4kad
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.11.dfsg-2%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
1
vulnerability VCID-v6pc-48dg-4kad
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.13.dfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-1%3Fdistro=trixie
4
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-3%3Fdistro=trixie
5
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.2-3%3Fdistro=trixie
aliases CVE-2004-0797
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s8dx-tft2-nfg6
6
url VCID-smft-ms93-6kf1
vulnerability_id VCID-smft-ms93-6kf1
summary
Multiple vulnerabilities have been found in rsync, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9843.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9843.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9843
reference_id
reference_type
scores
0
value 0.15071
scoring_system epss
scoring_elements 0.9454
published_at 2026-04-01T12:55:00Z
1
value 0.15071
scoring_system epss
scoring_elements 0.94547
published_at 2026-04-02T12:55:00Z
2
value 0.15071
scoring_system epss
scoring_elements 0.94555
published_at 2026-04-04T12:55:00Z
3
value 0.15071
scoring_system epss
scoring_elements 0.94557
published_at 2026-04-07T12:55:00Z
4
value 0.15071
scoring_system epss
scoring_elements 0.94567
published_at 2026-04-08T12:55:00Z
5
value 0.15071
scoring_system epss
scoring_elements 0.94571
published_at 2026-04-09T12:55:00Z
6
value 0.15071
scoring_system epss
scoring_elements 0.94575
published_at 2026-04-11T12:55:00Z
7
value 0.15071
scoring_system epss
scoring_elements 0.94577
published_at 2026-04-12T12:55:00Z
8
value 0.15071
scoring_system epss
scoring_elements 0.94578
published_at 2026-04-13T12:55:00Z
9
value 0.15071
scoring_system epss
scoring_elements 0.9459
published_at 2026-04-16T12:55:00Z
10
value 0.15071
scoring_system epss
scoring_elements 0.94595
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9843
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9843
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1402351
reference_id 1402351
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1402351
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=847275
reference_id 847275
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=847275
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924509
reference_id 924509
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924509
7
reference_url https://security.gentoo.org/glsa/201701-56
reference_id GLSA-201701-56
reference_type
scores
url https://security.gentoo.org/glsa/201701-56
8
reference_url https://security.gentoo.org/glsa/202007-54
reference_id GLSA-202007-54
reference_type
scores
url https://security.gentoo.org/glsa/202007-54
9
reference_url https://access.redhat.com/errata/RHSA-2017:1220
reference_id RHSA-2017:1220
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1220
10
reference_url https://access.redhat.com/errata/RHSA-2017:1221
reference_id RHSA-2017:1221
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1221
11
reference_url https://access.redhat.com/errata/RHSA-2017:1222
reference_id RHSA-2017:1222
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1222
12
reference_url https://access.redhat.com/errata/RHSA-2017:2999
reference_id RHSA-2017:2999
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2999
13
reference_url https://access.redhat.com/errata/RHSA-2017:3046
reference_id RHSA-2017:3046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3046
14
reference_url https://access.redhat.com/errata/RHSA-2017:3047
reference_id RHSA-2017:3047
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3047
15
reference_url https://access.redhat.com/errata/RHSA-2017:3453
reference_id RHSA-2017:3453
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3453
16
reference_url https://usn.ubuntu.com/4246-1/
reference_id USN-4246-1
reference_type
scores
url https://usn.ubuntu.com/4246-1/
17
reference_url https://usn.ubuntu.com/4292-1/
reference_id USN-4292-1
reference_type
scores
url https://usn.ubuntu.com/4292-1/
18
reference_url https://usn.ubuntu.com/7959-1/
reference_id USN-7959-1
reference_type
scores
url https://usn.ubuntu.com/7959-1/
fixed_packages
0
url pkg:deb/debian/zlib@1:1.2.8.dfsg-3?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.8.dfsg-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.8.dfsg-3%3Fdistro=trixie
1
url pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
1
vulnerability VCID-v6pc-48dg-4kad
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.11.dfsg-2%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
1
vulnerability VCID-v6pc-48dg-4kad
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.13.dfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-1%3Fdistro=trixie
4
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-3%3Fdistro=trixie
5
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.2-3%3Fdistro=trixie
aliases CVE-2016-9843
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-smft-ms93-6kf1
7
url VCID-sn99-6y6w-ybc6
vulnerability_id VCID-sn99-6y6w-ybc6
summary
Pngcrush is vulnerable to a buffer overflow which could potentially lead to
    the execution of arbitrary code.
references
0
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.6/SCOSA-2006.6.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.6/SCOSA-2006.6.txt
1
reference_url http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
2
reference_url http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1849.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1849.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-1849
reference_id
reference_type
scores
0
value 0.07988
scoring_system epss
scoring_elements 0.92095
published_at 2026-04-18T12:55:00Z
1
value 0.07988
scoring_system epss
scoring_elements 0.92053
published_at 2026-04-01T12:55:00Z
2
value 0.07988
scoring_system epss
scoring_elements 0.92059
published_at 2026-04-02T12:55:00Z
3
value 0.07988
scoring_system epss
scoring_elements 0.92067
published_at 2026-04-04T12:55:00Z
4
value 0.07988
scoring_system epss
scoring_elements 0.92071
published_at 2026-04-07T12:55:00Z
5
value 0.07988
scoring_system epss
scoring_elements 0.92083
published_at 2026-04-08T12:55:00Z
6
value 0.07988
scoring_system epss
scoring_elements 0.92087
published_at 2026-04-09T12:55:00Z
7
value 0.07988
scoring_system epss
scoring_elements 0.9209
published_at 2026-04-12T12:55:00Z
8
value 0.07988
scoring_system epss
scoring_elements 0.92086
published_at 2026-04-13T12:55:00Z
9
value 0.07988
scoring_system epss
scoring_elements 0.92097
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-1849
5
reference_url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162680
reference_id
reference_type
scores
url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162680
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1849
7
reference_url http://secunia.com/advisories/16137
reference_id
reference_type
scores
url http://secunia.com/advisories/16137
8
reference_url http://secunia.com/advisories/17326
reference_id
reference_type
scores
url http://secunia.com/advisories/17326
9
reference_url http://secunia.com/advisories/17516
reference_id
reference_type
scores
url http://secunia.com/advisories/17516
10
reference_url http://secunia.com/advisories/18377
reference_id
reference_type
scores
url http://secunia.com/advisories/18377
11
reference_url http://secunia.com/advisories/19334
reference_id
reference_type
scores
url http://secunia.com/advisories/19334
12
reference_url http://secunia.com/advisories/19550
reference_id
reference_type
scores
url http://secunia.com/advisories/19550
13
reference_url http://secunia.com/advisories/19597
reference_id
reference_type
scores
url http://secunia.com/advisories/19597
14
reference_url http://secunia.com/advisories/24788
reference_id
reference_type
scores
url http://secunia.com/advisories/24788
15
reference_url http://secunia.com/advisories/31492
reference_id
reference_type
scores
url http://secunia.com/advisories/31492
16
reference_url http://security.debian.org/pool/updates/main/z/zlib/zlib_1.2.2-4.sarge.2.diff.gz
reference_id
reference_type
scores
url http://security.debian.org/pool/updates/main/z/zlib/zlib_1.2.2-4.sarge.2.diff.gz
17
reference_url http://securitytracker.com/id?1014540
reference_id
reference_type
scores
url http://securitytracker.com/id?1014540
18
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/21456
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/21456
19
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11402
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11402
20
reference_url http://www.debian.org/security/2005/dsa-763
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-763
21
reference_url http://www.debian.org/security/2005/dsa-797
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-797
22
reference_url http://www.debian.org/security/2006/dsa-1026
reference_id
reference_type
scores
url http://www.debian.org/security/2006/dsa-1026
23
reference_url http://www.gentoo.org/security/en/glsa/glsa-200509-18.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200509-18.xml
24
reference_url http://www.gentoo.org/security/en/glsa/glsa-200603-18.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200603-18.xml
25
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:196
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:196
26
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2006:070
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2006:070
27
reference_url http://www.novell.com/linux/security/advisories/2005_43_zlib.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_43_zlib.html
28
reference_url http://www.osvdb.org/18141
reference_id
reference_type
scores
url http://www.osvdb.org/18141
29
reference_url http://www.redhat.com/support/errata/RHSA-2005-584.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-584.html
30
reference_url http://www.redhat.com/support/errata/RHSA-2008-0629.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2008-0629.html
31
reference_url http://www.securityfocus.com/archive/1/464745/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/464745/100/0/threaded
32
reference_url http://www.securityfocus.com/bid/14340
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/14340
33
reference_url http://www.ubuntulinux.org/usn/usn-151-3
reference_id
reference_type
scores
url http://www.ubuntulinux.org/usn/usn-151-3
34
reference_url http://www.vmware.com/support/vi3/doc/esx-3616065-patch.html
reference_id
reference_type
scores
url http://www.vmware.com/support/vi3/doc/esx-3616065-patch.html
35
reference_url http://www.vmware.com/support/vi3/doc/esx-9916286-patch.html
reference_id
reference_type
scores
url http://www.vmware.com/support/vi3/doc/esx-9916286-patch.html
36
reference_url http://www.vupen.com/english/advisories/2007/1267
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/1267
37
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=430649
reference_id 430649
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=430649
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zlib:zlib:1.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:zlib:zlib:1.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zlib:zlib:1.2.2:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-1849
reference_id CVE-2005-1849
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-1849
40
reference_url https://security.gentoo.org/glsa/200603-18
reference_id GLSA-200603-18
reference_type
scores
url https://security.gentoo.org/glsa/200603-18
41
reference_url https://access.redhat.com/errata/RHSA-2005:584
reference_id RHSA-2005:584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:584
42
reference_url https://access.redhat.com/errata/RHSA-2008:0264
reference_id RHSA-2008:0264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0264
43
reference_url https://access.redhat.com/errata/RHSA-2008:0525
reference_id RHSA-2008:0525
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0525
44
reference_url https://access.redhat.com/errata/RHSA-2008:0629
reference_id RHSA-2008:0629
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0629
45
reference_url https://usn.ubuntu.com/151-1/
reference_id USN-151-1
reference_type
scores
url https://usn.ubuntu.com/151-1/
46
reference_url https://usn.ubuntu.com/151-2/
reference_id USN-151-2
reference_type
scores
url https://usn.ubuntu.com/151-2/
47
reference_url https://usn.ubuntu.com/151-3/
reference_id USN-151-3
reference_type
scores
url https://usn.ubuntu.com/151-3/
48
reference_url https://usn.ubuntu.com/151-4/
reference_id USN-151-4
reference_type
scores
url https://usn.ubuntu.com/151-4/
fixed_packages
0
url pkg:deb/debian/zlib@1:1.2.3-1?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.3-1%3Fdistro=trixie
1
url pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
1
vulnerability VCID-v6pc-48dg-4kad
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.11.dfsg-2%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
1
vulnerability VCID-v6pc-48dg-4kad
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.13.dfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-1%3Fdistro=trixie
4
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-3%3Fdistro=trixie
5
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.2-3%3Fdistro=trixie
aliases CVE-2005-1849
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sn99-6y6w-ybc6
8
url VCID-xd6j-x83x-r3gn
vulnerability_id VCID-xd6j-x83x-r3gn
summary
Out-of-bounds Write
zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-25032.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-25032.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-25032
reference_id
reference_type
scores
0
value 0.00081
scoring_system epss
scoring_elements 0.24064
published_at 2026-04-02T12:55:00Z
1
value 0.00081
scoring_system epss
scoring_elements 0.23937
published_at 2026-04-01T12:55:00Z
2
value 0.00081
scoring_system epss
scoring_elements 0.24102
published_at 2026-04-04T12:55:00Z
3
value 0.00089
scoring_system epss
scoring_elements 0.25309
published_at 2026-04-18T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.25311
published_at 2026-04-13T12:55:00Z
5
value 0.00089
scoring_system epss
scoring_elements 0.25364
published_at 2026-04-12T12:55:00Z
6
value 0.00089
scoring_system epss
scoring_elements 0.25406
published_at 2026-04-11T12:55:00Z
7
value 0.00089
scoring_system epss
scoring_elements 0.25394
published_at 2026-04-09T12:55:00Z
8
value 0.00089
scoring_system epss
scoring_elements 0.2535
published_at 2026-04-08T12:55:00Z
9
value 0.00089
scoring_system epss
scoring_elements 0.25282
published_at 2026-04-07T12:55:00Z
10
value 0.00089
scoring_system epss
scoring_elements 0.25318
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-25032
2
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032
4
reference_url http://seclists.org/fulldisclosure/2022/May/33
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url http://seclists.org/fulldisclosure/2022/May/33
5
reference_url http://seclists.org/fulldisclosure/2022/May/35
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url http://seclists.org/fulldisclosure/2022/May/35
6
reference_url http://seclists.org/fulldisclosure/2022/May/38
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url http://seclists.org/fulldisclosure/2022/May/38
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
9
reference_url https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
10
reference_url https://github.com/madler/zlib/issues/605
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://github.com/madler/zlib/issues/605
11
reference_url https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html
12
reference_url https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html
13
reference_url https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
26
reference_url https://security.gentoo.org/glsa/202210-42
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://security.gentoo.org/glsa/202210-42
27
reference_url https://security.netapp.com/advisory/ntap-20220526-0009
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220526-0009
28
reference_url https://security.netapp.com/advisory/ntap-20220526-0009/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://security.netapp.com/advisory/ntap-20220526-0009/
29
reference_url https://security.netapp.com/advisory/ntap-20220729-0004
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20220729-0004
30
reference_url https://security.netapp.com/advisory/ntap-20220729-0004/
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://security.netapp.com/advisory/ntap-20220729-0004/
31
reference_url https://support.apple.com/kb/HT213255
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://support.apple.com/kb/HT213255
32
reference_url https://support.apple.com/kb/HT213256
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://support.apple.com/kb/HT213256
33
reference_url https://support.apple.com/kb/HT213257
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://support.apple.com/kb/HT213257
34
reference_url https://www.debian.org/security/2022/dsa-5111
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://www.debian.org/security/2022/dsa-5111
35
reference_url https://www.openwall.com/lists/oss-security/2022/03/24/1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://www.openwall.com/lists/oss-security/2022/03/24/1
36
reference_url https://www.openwall.com/lists/oss-security/2022/03/28/1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://www.openwall.com/lists/oss-security/2022/03/28/1
37
reference_url https://www.openwall.com/lists/oss-security/2022/03/28/3
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://www.openwall.com/lists/oss-security/2022/03/28/3
38
reference_url https://www.oracle.com/security-alerts/cpujul2022.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://www.oracle.com/security-alerts/cpujul2022.html
39
reference_url http://www.openwall.com/lists/oss-security/2022/03/25/2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url http://www.openwall.com/lists/oss-security/2022/03/25/2
40
reference_url http://www.openwall.com/lists/oss-security/2022/03/26/1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url http://www.openwall.com/lists/oss-security/2022/03/26/1
41
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008265
reference_id 1008265
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008265
42
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2067945
reference_id 2067945
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2067945
43
reference_url https://security.archlinux.org/ASA-202204-3
reference_id ASA-202204-3
reference_type
scores
url https://security.archlinux.org/ASA-202204-3
44
reference_url https://security.archlinux.org/AVG-2657
reference_id AVG-2657
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2657
45
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-25032
reference_id CVE-2018-25032
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-25032
46
reference_url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2018-25032.yml
reference_id CVE-2018-25032.YML
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2018-25032.yml
47
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/
reference_id DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/
48
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/
reference_id DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/
49
reference_url https://github.com/advisories/GHSA-jc36-42cf-vqwj
reference_id GHSA-jc36-42cf-vqwj
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-jc36-42cf-vqwj
50
reference_url https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
reference_id GHSA-v6gp-9mmm-c6p5
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5
51
reference_url https://security.gentoo.org/glsa/202405-22
reference_id GLSA-202405-22
reference_type
scores
url https://security.gentoo.org/glsa/202405-22
52
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/
reference_id JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/
53
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
reference_id NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/
54
reference_url https://access.redhat.com/errata/RHSA-2022:1591
reference_id RHSA-2022:1591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1591
55
reference_url https://access.redhat.com/errata/RHSA-2022:1642
reference_id RHSA-2022:1642
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1642
56
reference_url https://access.redhat.com/errata/RHSA-2022:1661
reference_id RHSA-2022:1661
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1661
57
reference_url https://access.redhat.com/errata/RHSA-2022:2192
reference_id RHSA-2022:2192
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2192
58
reference_url https://access.redhat.com/errata/RHSA-2022:2197
reference_id RHSA-2022:2197
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2197
59
reference_url https://access.redhat.com/errata/RHSA-2022:2198
reference_id RHSA-2022:2198
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2198
60
reference_url https://access.redhat.com/errata/RHSA-2022:2201
reference_id RHSA-2022:2201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2201
61
reference_url https://access.redhat.com/errata/RHSA-2022:2213
reference_id RHSA-2022:2213
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2213
62
reference_url https://access.redhat.com/errata/RHSA-2022:2214
reference_id RHSA-2022:2214
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:2214
63
reference_url https://access.redhat.com/errata/RHSA-2022:4584
reference_id RHSA-2022:4584
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4584
64
reference_url https://access.redhat.com/errata/RHSA-2022:4592
reference_id RHSA-2022:4592
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4592
65
reference_url https://access.redhat.com/errata/RHSA-2022:4845
reference_id RHSA-2022:4845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4845
66
reference_url https://access.redhat.com/errata/RHSA-2022:4896
reference_id RHSA-2022:4896
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:4896
67
reference_url https://access.redhat.com/errata/RHSA-2022:5439
reference_id RHSA-2022:5439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:5439
68
reference_url https://access.redhat.com/errata/RHSA-2022:7144
reference_id RHSA-2022:7144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7144
69
reference_url https://access.redhat.com/errata/RHSA-2022:7813
reference_id RHSA-2022:7813
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7813
70
reference_url https://access.redhat.com/errata/RHSA-2022:8420
reference_id RHSA-2022:8420
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8420
71
reference_url https://access.redhat.com/errata/RHSA-2023:0943
reference_id RHSA-2023:0943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0943
72
reference_url https://access.redhat.com/errata/RHSA-2023:0975
reference_id RHSA-2023:0975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0975
73
reference_url https://access.redhat.com/errata/RHSA-2023:0976
reference_id RHSA-2023:0976
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0976
74
reference_url https://usn.ubuntu.com/5355-1/
reference_id USN-5355-1
reference_type
scores
url https://usn.ubuntu.com/5355-1/
75
reference_url https://usn.ubuntu.com/5355-2/
reference_id USN-5355-2
reference_type
scores
url https://usn.ubuntu.com/5355-2/
76
reference_url https://usn.ubuntu.com/5359-1/
reference_id USN-5359-1
reference_type
scores
url https://usn.ubuntu.com/5359-1/
77
reference_url https://usn.ubuntu.com/5359-2/
reference_id USN-5359-2
reference_type
scores
url https://usn.ubuntu.com/5359-2/
78
reference_url https://usn.ubuntu.com/5739-1/
reference_id USN-5739-1
reference_type
scores
url https://usn.ubuntu.com/5739-1/
79
reference_url https://usn.ubuntu.com/6736-1/
reference_id USN-6736-1
reference_type
scores
url https://usn.ubuntu.com/6736-1/
80
reference_url https://usn.ubuntu.com/6736-2/
reference_id USN-6736-2
reference_type
scores
url https://usn.ubuntu.com/6736-2/
81
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
reference_id VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/
82
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
reference_id XOKFMSNQ5D5WGMALBNBXU3GE442V74WU
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/
fixed_packages
0
url pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.11.dfsg-2%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
1
vulnerability VCID-v6pc-48dg-4kad
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.11.dfsg-2%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/zlib@1:1.2.11.dfsg-4?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.11.dfsg-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.11.dfsg-4%3Fdistro=trixie
3
url pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
1
vulnerability VCID-v6pc-48dg-4kad
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.13.dfsg-1%3Fdistro=trixie
4
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-1%3Fdistro=trixie
5
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-3%3Fdistro=trixie
6
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.2-3%3Fdistro=trixie
aliases CVE-2018-25032, GHSA-jc36-42cf-vqwj
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xd6j-x83x-r3gn
9
url VCID-y9kk-6zyw-6qfn
vulnerability_id VCID-y9kk-6zyw-6qfn
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0107.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0107.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2003-0107
reference_id
reference_type
scores
0
value 0.35642
scoring_system epss
scoring_elements 0.97039
published_at 2026-04-01T12:55:00Z
1
value 0.35642
scoring_system epss
scoring_elements 0.97046
published_at 2026-04-02T12:55:00Z
2
value 0.35642
scoring_system epss
scoring_elements 0.9705
published_at 2026-04-04T12:55:00Z
3
value 0.35642
scoring_system epss
scoring_elements 0.97051
published_at 2026-04-07T12:55:00Z
4
value 0.35642
scoring_system epss
scoring_elements 0.97061
published_at 2026-04-08T12:55:00Z
5
value 0.35642
scoring_system epss
scoring_elements 0.97062
published_at 2026-04-09T12:55:00Z
6
value 0.35642
scoring_system epss
scoring_elements 0.97065
published_at 2026-04-12T12:55:00Z
7
value 0.35642
scoring_system epss
scoring_elements 0.97066
published_at 2026-04-13T12:55:00Z
8
value 0.35642
scoring_system epss
scoring_elements 0.97076
published_at 2026-04-16T12:55:00Z
9
value 0.35642
scoring_system epss
scoring_elements 0.9708
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2003-0107
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0107
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1616967
reference_id 1616967
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1616967
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/22273.c
reference_id CVE-2003-0107;OSVDB-6599
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/22273.c
5
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/22274.c
reference_id CVE-2003-0107;OSVDB-6599
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/22274.c
6
reference_url https://www.securityfocus.com/bid/6913/info
reference_id CVE-2003-0107;OSVDB-6599
reference_type exploit
scores
url https://www.securityfocus.com/bid/6913/info
7
reference_url https://access.redhat.com/errata/RHSA-2003:079
reference_id RHSA-2003:079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:079
8
reference_url https://access.redhat.com/errata/RHSA-2003:081
reference_id RHSA-2003:081
reference_type
scores
url https://access.redhat.com/errata/RHSA-2003:081
fixed_packages
0
url pkg:deb/debian/zlib@1:1.1.4-10?distro=trixie
purl pkg:deb/debian/zlib@1:1.1.4-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.1.4-10%3Fdistro=trixie
1
url pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
1
vulnerability VCID-v6pc-48dg-4kad
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.11.dfsg-2%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
1
vulnerability VCID-v6pc-48dg-4kad
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.13.dfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-1%3Fdistro=trixie
4
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-3%3Fdistro=trixie
5
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.2-3%3Fdistro=trixie
aliases CVE-2003-0107
risk_score 0.6
exploitability 2.0
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y9kk-6zyw-6qfn
10
url VCID-ys8b-uuv1-pkfm
vulnerability_id VCID-ys8b-uuv1-pkfm
summary A buffer overflow in zlib might allow an attacker to cause remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37434.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37434.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-37434
reference_id
reference_type
scores
0
value 0.92544
scoring_system epss
scoring_elements 0.9974
published_at 2026-04-18T12:55:00Z
1
value 0.92544
scoring_system epss
scoring_elements 0.99738
published_at 2026-04-13T12:55:00Z
2
value 0.92544
scoring_system epss
scoring_elements 0.99739
published_at 2026-04-16T12:55:00Z
3
value 0.92544
scoring_system epss
scoring_elements 0.99736
published_at 2026-04-02T12:55:00Z
4
value 0.92544
scoring_system epss
scoring_elements 0.99737
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-37434
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37434
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/curl/curl/issues/9271
reference_id
reference_type
scores
url https://github.com/curl/curl/issues/9271
5
reference_url https://github.com/ivd38/zlib_overflow
reference_id
reference_type
scores
url https://github.com/ivd38/zlib_overflow
6
reference_url https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063
reference_id
reference_type
scores
url https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063
7
reference_url https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1
reference_id
reference_type
scores
url https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1
8
reference_url https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764
reference_id
reference_type
scores
url https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764
9
reference_url http://www.openwall.com/lists/oss-security/2022/08/05/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2022/08/05/2
10
reference_url http://www.openwall.com/lists/oss-security/2022/08/09/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2022/08/09/1
11
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016710
reference_id 1016710
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016710
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2116639
reference_id 2116639
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2116639
13
reference_url https://security.archlinux.org/AVG-2821
reference_id AVG-2821
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2821
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-37434
reference_id CVE-2022-37434
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2022-37434
15
reference_url https://access.redhat.com/errata/RHSA-2022:7106
reference_id RHSA-2022:7106
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7106
16
reference_url https://access.redhat.com/errata/RHSA-2022:7314
reference_id RHSA-2022:7314
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7314
17
reference_url https://access.redhat.com/errata/RHSA-2022:7793
reference_id RHSA-2022:7793
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7793
18
reference_url https://access.redhat.com/errata/RHSA-2022:8291
reference_id RHSA-2022:8291
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8291
19
reference_url https://access.redhat.com/errata/RHSA-2022:8841
reference_id RHSA-2022:8841
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8841
20
reference_url https://access.redhat.com/errata/RHSA-2023:1095
reference_id RHSA-2023:1095
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1095
21
reference_url https://access.redhat.com/errata/RHSA-2024:0254
reference_id RHSA-2024:0254
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0254
22
reference_url https://usn.ubuntu.com/5570-1/
reference_id USN-5570-1
reference_type
scores
url https://usn.ubuntu.com/5570-1/
23
reference_url https://usn.ubuntu.com/5570-2/
reference_id USN-5570-2
reference_type
scores
url https://usn.ubuntu.com/5570-2/
24
reference_url https://usn.ubuntu.com/5573-1/
reference_id USN-5573-1
reference_type
scores
url https://usn.ubuntu.com/5573-1/
25
reference_url https://usn.ubuntu.com/6736-1/
reference_id USN-6736-1
reference_type
scores
url https://usn.ubuntu.com/6736-1/
26
reference_url https://usn.ubuntu.com/6736-2/
reference_id USN-6736-2
reference_type
scores
url https://usn.ubuntu.com/6736-2/
fixed_packages
0
url pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
1
vulnerability VCID-v6pc-48dg-4kad
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.11.dfsg-2%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/zlib@1:1.2.11.dfsg-4.1?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.11.dfsg-4.1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.11.dfsg-4.1%3Fdistro=trixie
2
url pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie
purl pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
1
vulnerability VCID-v6pc-48dg-4kad
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.13.dfsg-1%3Fdistro=trixie
3
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-1%3Fdistro=trixie
4
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ac5e-emja-v3fe
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-3%3Fdistro=trixie
5
url pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie
purl pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.2-3%3Fdistro=trixie
aliases CVE-2022-37434
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ys8b-uuv1-pkfm
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.13.dfsg-1%3Fdistro=trixie