Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/943953?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/943953?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie", "type": "deb", "namespace": "debian", "name": "zlib", "version": "1:1.2.13.dfsg-1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "1:1.3.dfsg-2", "latest_non_vulnerable_version": "1:1.3.dfsg+really1.3.2-3", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64466?format=api", "vulnerability_id": "VCID-ac5e-emja-v3fe", "summary": "zlib: zlib: Denial of Service via infinite loop in CRC32 combine functions", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27171.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27171.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-27171", "reference_id": "", "reference_type": "", "scores": [ { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00659", "published_at": "2026-04-21T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00633", "published_at": "2026-04-02T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00629", "published_at": "2026-04-07T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00627", "published_at": "2026-04-08T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00621", "published_at": "2026-04-09T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.0062", "published_at": "2026-04-11T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00616", "published_at": "2026-04-12T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00618", "published_at": "2026-04-18T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00612", "published_at": "2026-04-16T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00626", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-27171" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27171", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27171" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1128336", "reference_id": "1128336", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1128336" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440530", "reference_id": "2440530", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2440530" }, { "reference_url": "https://github.com/madler/zlib/issues/904", "reference_id": "904", "reference_type": "", "scores": [ { "value": "2.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-18T13:35:50Z/" } ], "url": "https://github.com/madler/zlib/issues/904" }, { "reference_url": "https://7asecurity.com/reports/pentest-report-zlib-RC1.1.pdf", "reference_id": "pentest-report-zlib-RC1.1.pdf", "reference_type": "", "scores": [ { "value": "2.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-18T13:35:50Z/" } ], "url": "https://7asecurity.com/reports/pentest-report-zlib-RC1.1.pdf" }, { "reference_url": "https://github.com/madler/zlib/releases/tag/v1.3.2", "reference_id": "v1.3.2", "reference_type": "", "scores": [ { "value": "2.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-18T13:35:50Z/" } ], "url": "https://github.com/madler/zlib/releases/tag/v1.3.2" }, { "reference_url": "https://7asecurity.com/blog/2026/02/zlib-7asecurity-audit/", "reference_id": "zlib-7asecurity-audit", "reference_type": "", "scores": [ { "value": "2.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-18T13:35:50Z/" } ], "url": "https://7asecurity.com/blog/2026/02/zlib-7asecurity-audit/" }, { "reference_url": "https://ostif.org/zlib-audit-complete/", "reference_id": "zlib-audit-complete", "reference_type": "", "scores": [ { "value": "2.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-18T13:35:50Z/" } ], "url": "https://ostif.org/zlib-audit-complete/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943969?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943957?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.2-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2026-27171" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ac5e-emja-v3fe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/19471?format=api", "vulnerability_id": "VCID-v6pc-48dg-4kad", "summary": "Integer Overflow or Wraparound\nMiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45853.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-45853.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-45853", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01287", "scoring_system": "epss", "scoring_elements": "0.79662", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01287", "scoring_system": "epss", "scoring_elements": "0.79659", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01287", "scoring_system": "epss", "scoring_elements": "0.79629", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01287", "scoring_system": "epss", "scoring_elements": "0.79636", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01287", "scoring_system": "epss", "scoring_elements": "0.79652", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01287", "scoring_system": "epss", "scoring_elements": "0.79631", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01322", "scoring_system": "epss", "scoring_elements": "0.79863", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01322", "scoring_system": "epss", "scoring_elements": "0.79841", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01322", "scoring_system": "epss", "scoring_elements": "0.79879", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01322", "scoring_system": "epss", "scoring_elements": "0.7985", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-45853" }, { "reference_url": "https://chromium.googlesource.com/chromium/src/+/d709fb23806858847131027da95ef4c548813356", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:37Z/" } ], "url": "https://chromium.googlesource.com/chromium/src/+/d709fb23806858847131027da95ef4c548813356" }, { "reference_url": "https://chromium.googlesource.com/chromium/src/+/de29dd6c7151d3cd37cb4cf0036800ddfb1d8b61", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:37Z/" } ], "url": "https://chromium.googlesource.com/chromium/src/+/de29dd6c7151d3cd37cb4cf0036800ddfb1d8b61" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45853", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45853" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/madler/zlib/blob/ac8f12c97d1afd9bafa9c710f827d40a407d3266/contrib/README.contrib#L1-L4", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:37Z/" } ], "url": "https://github.com/madler/zlib/blob/ac8f12c97d1afd9bafa9c710f827d40a407d3266/contrib/README.contrib#L1-L4" }, { "reference_url": "https://github.com/madler/zlib/commit/73331a6a0481067628f065ffe87bb1d8f787d10c", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/madler/zlib/commit/73331a6a0481067628f065ffe87bb1d8f787d10c" }, { "reference_url": "https://github.com/madler/zlib/pull/843", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:37Z/" } ], "url": "https://github.com/madler/zlib/pull/843" }, { "reference_url": "https://github.com/smihica/pyminizip", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/smihica/pyminizip" }, { "reference_url": "https://github.com/smihica/pyminizip/blob/master/zlib-1.2.11/contrib/minizip/zip.c", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/smihica/pyminizip/blob/master/zlib-1.2.11/contrib/minizip/zip.c" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00026.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:37Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00026.html" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45853", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45853" }, { "reference_url": "https://pypi.org/project/pyminizip/#history", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:37Z/" } ], "url": "https://pypi.org/project/pyminizip/#history" }, { "reference_url": "https://security.gentoo.org/glsa/202401-18", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:37Z/" } ], "url": "https://security.gentoo.org/glsa/202401-18" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20231130-0009", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20231130-0009" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20231130-0009/", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:37Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20231130-0009/" }, { "reference_url": "https://www.winimage.com/zLibDll/minizip.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:37Z/" } ], "url": "https://www.winimage.com/zLibDll/minizip.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/10/20/9", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:37Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/10/20/9" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/01/24/10", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-19T03:55:37Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/01/24/10" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054290", "reference_id": "1054290", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054290" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056718", "reference_id": "1056718", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056718" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244556", "reference_id": "2244556", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244556" }, { "reference_url": "https://security.archlinux.org/AVG-2847", "reference_id": "AVG-2847", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2847" }, { "reference_url": "https://github.com/advisories/GHSA-mq29-j5xf-cjwr", "reference_id": "GHSA-mq29-j5xf-cjwr", "reference_type": "", "scores": [ { "value": "CRITICAL", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-mq29-j5xf-cjwr" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7626", "reference_id": "RHSA-2023:7626", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7626" }, { "reference_url": "https://usn.ubuntu.com/7107-1/", "reference_id": "USN-7107-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7107-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943967?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943958?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943956?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943957?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.2-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2023-45853", "GHSA-mq29-j5xf-cjwr" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v6pc-48dg-4kad" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89053?format=api", "vulnerability_id": "VCID-1vu9-xzw9-kfe2", "summary": "zlib DoS", "references": [ { "reference_url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:16.zlib.asc", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:16.zlib.asc" }, { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.6/SCOSA-2006.6.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.6/SCOSA-2006.6.txt" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce//2008/Nov/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce//2008/Nov/msg00001.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2096.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2096.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2096", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.43032", "scoring_system": "epss", "scoring_elements": "0.975", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.43032", "scoring_system": "epss", "scoring_elements": "0.97466", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.43032", "scoring_system": "epss", "scoring_elements": "0.97473", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.43032", "scoring_system": "epss", "scoring_elements": "0.97476", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.43032", "scoring_system": "epss", "scoring_elements": "0.97477", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.43032", "scoring_system": "epss", "scoring_elements": "0.97483", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.43032", "scoring_system": "epss", "scoring_elements": "0.97484", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.43032", "scoring_system": "epss", "scoring_elements": "0.97487", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.43032", "scoring_system": "epss", "scoring_elements": "0.97489", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.43032", "scoring_system": "epss", "scoring_elements": "0.9749", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.43032", "scoring_system": "epss", "scoring_elements": "0.97497", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2096" }, { "reference_url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162391", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162391" }, { "reference_url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162680", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162680" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2096", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2096" }, { "reference_url": "http://secunia.com/advisories/15949", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/15949" }, { "reference_url": "http://secunia.com/advisories/17054", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17054" }, { "reference_url": "http://secunia.com/advisories/17225", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17225" }, { "reference_url": "http://secunia.com/advisories/17236", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17236" }, { "reference_url": "http://secunia.com/advisories/17326", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17326" }, { "reference_url": "http://secunia.com/advisories/17516", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17516" }, { "reference_url": "http://secunia.com/advisories/18377", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18377" }, { "reference_url": "http://secunia.com/advisories/18406", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18406" }, { "reference_url": "http://secunia.com/advisories/18507", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18507" }, { "reference_url": "http://secunia.com/advisories/19550", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19550" }, { "reference_url": "http://secunia.com/advisories/19597", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19597" }, { "reference_url": "http://secunia.com/advisories/24788", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24788" }, { "reference_url": "http://secunia.com/advisories/31492", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31492" }, { "reference_url": "http://secunia.com/advisories/32706", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32706" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200507-05.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200507-05.xml" }, { "reference_url": "http://securitytracker.com/id?1014398", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1014398" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24064", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24064" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11500", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11500" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1262", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1262" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1542", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1542" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101989-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101989-1" }, { "reference_url": "http://support.apple.com/kb/HT3298", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT3298" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2006-016.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-016.htm" }, { "reference_url": "http://www.debian.org/security/2005/dsa-740", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-740" }, { "reference_url": "http://www.debian.org/security/2005/dsa-797", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-797" }, { "reference_url": "http://www.debian.org/security/2006/dsa-1026", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-1026" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200509-18.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200509-18.xml" }, { "reference_url": "http://www.kb.cert.org/vuls/id/680620", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kb.cert.org/vuls/id/680620" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:112", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:112" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:196", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:196" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:070", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:070" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-569.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-569.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/421411/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/421411/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/464745/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/464745/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/482503/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/482503/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/482505/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/482505/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/482571/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/482571/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/482601/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/482601/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/482949/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/482949/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/482950/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/482950/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/14162", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/14162" }, { "reference_url": "http://www.ubuntulinux.org/usn/usn-151-3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntulinux.org/usn/usn-151-3" }, { "reference_url": "http://www.vmware.com/support/vi3/doc/esx-3616065-patch.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/support/vi3/doc/esx-3616065-patch.html" }, { "reference_url": "http://www.vmware.com/support/vi3/doc/esx-9916286-patch.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/support/vi3/doc/esx-9916286-patch.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/0978", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/0978" }, { "reference_url": "http://www.vupen.com/english/advisories/2006/0144", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2006/0144" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/1267", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/1267" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317133", "reference_id": "317133", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317133" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317523", "reference_id": "317523", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317523" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317966", "reference_id": "317966", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317966" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317967", "reference_id": "317967", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317967" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317968", "reference_id": "317968", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=317968" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318014", "reference_id": "318014", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318014" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318069", "reference_id": "318069", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318069" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318091", "reference_id": "318091", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318091" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318099", "reference_id": "318099", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318099" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318100", "reference_id": "318100", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=318100" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=332236", "reference_id": "332236", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=332236" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=430650", "reference_id": "430650", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430650" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zlib:zlib:1.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zlib:zlib:1.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zlib:zlib:1.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zlib:zlib:1.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zlib:zlib:1.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zlib:zlib:1.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zlib:zlib:1.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zlib:zlib:1.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zlib:zlib:1.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096", "reference_id": "CVE-2005-2096", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2096" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:569", "reference_id": "RHSA-2005:569", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:569" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0264", "reference_id": "RHSA-2008:0264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0264" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0525", "reference_id": "RHSA-2008:0525", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0525" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0629", "reference_id": "RHSA-2008:0629", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0629" }, { "reference_url": "https://usn.ubuntu.com/148-1/", "reference_id": "USN-148-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/148-1/" }, { "reference_url": "https://usn.ubuntu.com/151-2/", "reference_id": "USN-151-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/151-2/" }, { "reference_url": "https://usn.ubuntu.com/151-3/", "reference_id": "USN-151-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/151-3/" }, { "reference_url": "https://usn.ubuntu.com/151-4/", "reference_id": "USN-151-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/151-4/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943961?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.2-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.2-7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943955?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" }, { "vulnerability": "VCID-v6pc-48dg-4kad" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.11.dfsg-2%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943953?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" }, { "vulnerability": "VCID-v6pc-48dg-4kad" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.13.dfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943958?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943956?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943957?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.2-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2005-2096" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1vu9-xzw9-kfe2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65193?format=api", "vulnerability_id": "VCID-3aq8-fkrc-hqa2", "summary": "zlib: zlib: Arbitrary code execution via buffer overflow in untgz utility", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22184.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22184.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-22184", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04137", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04161", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04186", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04203", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04221", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04206", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04157", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04175", "published_at": "2026-04-07T12:55:00Z" }, { "value": "6e-05", "scoring_system": "epss", "scoring_elements": "0.00455", "published_at": "2026-04-21T12:55:00Z" }, { "value": "6e-05", "scoring_system": "epss", "scoring_elements": "0.00421", "published_at": "2026-04-16T12:55:00Z" }, { "value": "6e-05", "scoring_system": "epss", "scoring_elements": "0.00425", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-22184" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22184", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22184" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427688", "reference_id": "2427688", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427688" }, { "reference_url": "https://seclists.org/fulldisclosure/2026/Jan/3", "reference_id": "3", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-01-07T21:17:54Z/" } ], "url": "https://seclists.org/fulldisclosure/2026/Jan/3" }, { "reference_url": "https://github.com/madler/zlib", "reference_id": "zlib", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-01-07T21:17:54Z/" } ], "url": "https://github.com/madler/zlib" }, { "reference_url": "https://zlib.net/", "reference_id": "zlib.net", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-01-07T21:17:54Z/" } ], "url": "https://zlib.net/" }, { "reference_url": "https://www.vulncheck.com/advisories/zlib-untgz-global-buffer-overflow-in-tgzfname", "reference_id": "zlib-untgz-global-buffer-overflow-in-tgzfname", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2026-01-07T21:17:54Z/" } ], "url": "https://www.vulncheck.com/advisories/zlib-untgz-global-buffer-overflow-in-tgzfname" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943968?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.6.dfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.6.dfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943955?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" }, { "vulnerability": "VCID-v6pc-48dg-4kad" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.11.dfsg-2%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943953?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" }, { "vulnerability": "VCID-v6pc-48dg-4kad" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.13.dfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943958?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943956?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943957?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.2-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2026-22184" ], "risk_score": 3.9, "exploitability": "0.5", "weighted_severity": "7.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3aq8-fkrc-hqa2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56189?format=api", "vulnerability_id": "VCID-eyjp-7kks-jbfr", "summary": "Multiple vulnerabilities have been found in rsync, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9841.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9841.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9841", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.13495", "scoring_system": "epss", "scoring_elements": "0.94234", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.13495", "scoring_system": "epss", "scoring_elements": "0.94204", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.13495", "scoring_system": "epss", "scoring_elements": "0.94208", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.13495", "scoring_system": "epss", "scoring_elements": "0.94213", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.13495", "scoring_system": "epss", "scoring_elements": "0.94214", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.13495", "scoring_system": "epss", "scoring_elements": "0.94229", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.20281", "scoring_system": "epss", "scoring_elements": "0.95479", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.20281", "scoring_system": "epss", "scoring_elements": "0.95488", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.20281", "scoring_system": "epss", "scoring_elements": "0.95494", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.20848", "scoring_system": "epss", "scoring_elements": "0.95599", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9841" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9841" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:S/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402346", "reference_id": "1402346", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402346" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=847270", "reference_id": "847270", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=847270" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924509", "reference_id": "924509", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924509" }, { "reference_url": "https://security.gentoo.org/glsa/201701-56", "reference_id": "GLSA-201701-56", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-56" }, { "reference_url": "https://security.gentoo.org/glsa/202007-54", "reference_id": "GLSA-202007-54", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-54" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1220", "reference_id": "RHSA-2017:1220", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1220" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1221", "reference_id": "RHSA-2017:1221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1221" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1222", "reference_id": "RHSA-2017:1222", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1222" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2999", "reference_id": "RHSA-2017:2999", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2999" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3046", "reference_id": "RHSA-2017:3046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3047", "reference_id": "RHSA-2017:3047", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3047" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453", "reference_id": "RHSA-2017:3453", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3453" }, { "reference_url": "https://usn.ubuntu.com/4246-1/", "reference_id": "USN-4246-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4246-1/" }, { "reference_url": "https://usn.ubuntu.com/4292-1/", "reference_id": "USN-4292-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4292-1/" }, { "reference_url": "https://usn.ubuntu.com/6736-1/", "reference_id": "USN-6736-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6736-1/" }, { "reference_url": "https://usn.ubuntu.com/6736-2/", "reference_id": "USN-6736-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6736-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943963?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.8.dfsg-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.8.dfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943955?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" }, { "vulnerability": "VCID-v6pc-48dg-4kad" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.11.dfsg-2%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943953?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" }, { "vulnerability": "VCID-v6pc-48dg-4kad" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.13.dfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943958?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943956?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943957?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.2-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-9841" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eyjp-7kks-jbfr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56190?format=api", "vulnerability_id": "VCID-m6xx-a91r-sbhu", "summary": "Multiple vulnerabilities have been found in rsync, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9842.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9842.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9842", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.12133", "scoring_system": "epss", "scoring_elements": "0.93837", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.12133", "scoring_system": "epss", "scoring_elements": "0.93839", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.12133", "scoring_system": "epss", "scoring_elements": "0.9377", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.12133", "scoring_system": "epss", "scoring_elements": "0.93779", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.12133", "scoring_system": "epss", "scoring_elements": "0.93809", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.12133", "scoring_system": "epss", "scoring_elements": "0.93804", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.12133", "scoring_system": "epss", "scoring_elements": "0.93801", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.12133", "scoring_system": "epss", "scoring_elements": "0.93793", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.12133", "scoring_system": "epss", "scoring_elements": "0.93789", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.12133", "scoring_system": "epss", "scoring_elements": "0.93832", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9842" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9842", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9842" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:S/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402348", "reference_id": "1402348", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402348" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/12/05/21", "reference_id": "21", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2016/12/05/21" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=847274", "reference_id": "847274", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=847274" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924509", "reference_id": "924509", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924509" }, { "reference_url": "http://www.securityfocus.com/bid/95131", "reference_id": "95131", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/" } ], "url": "http://www.securityfocus.com/bid/95131" }, { "reference_url": "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib", "reference_id": "Completed#zlib", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/" } ], "url": "https://wiki.mozilla.org/MOSS/Secure_Open_Source/Completed#zlib" }, { "reference_url": "https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958", "reference_id": "e54e1299404101a5a9d0cf5e45512b543967f958", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/" } ], "url": "https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958" }, { "reference_url": "https://security.gentoo.org/glsa/201701-56", "reference_id": "GLSA-201701-56", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/" } ], "url": "https://security.gentoo.org/glsa/201701-56" }, { "reference_url": "https://security.gentoo.org/glsa/202007-54", "reference_id": "GLSA-202007-54", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/" } ], "url": "https://security.gentoo.org/glsa/202007-54" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html", "reference_id": "msg00027.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html", "reference_id": "msg00030.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00030.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html", "reference_id": "msg00050.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/" } ], "url": "http://lists.opensuse.org/opensuse-updates/2017-01/msg00050.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html", "reference_id": "msg00053.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/" } ], "url": "http://lists.opensuse.org/opensuse-updates/2017-01/msg00053.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html", "reference_id": "msg00127.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/" } ], "url": "http://lists.opensuse.org/opensuse-updates/2016-12/msg00127.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1220", "reference_id": "RHSA-2017:1220", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1220" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1221", "reference_id": "RHSA-2017:1221", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1221" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1222", "reference_id": "RHSA-2017:1222", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1222" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2999", "reference_id": "RHSA-2017:2999", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:2999" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3046", "reference_id": "RHSA-2017:3046", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:3046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3047", "reference_id": "RHSA-2017:3047", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:3047" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453", "reference_id": "RHSA-2017:3453", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2017:3453" }, { "reference_url": "https://usn.ubuntu.com/4246-1/", "reference_id": "USN-4246-1", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/" } ], "url": "https://usn.ubuntu.com/4246-1/" }, { "reference_url": "https://usn.ubuntu.com/4292-1/", "reference_id": "USN-4292-1", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/" } ], "url": "https://usn.ubuntu.com/4292-1/" }, { "reference_url": "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf", "reference_id": "Zlib-report.pdf", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-04T16:34:37Z/" } ], "url": "https://wiki.mozilla.org/images/0/09/Zlib-report.pdf" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943962?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.8.dfsg-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.8.dfsg-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943955?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" }, { "vulnerability": "VCID-v6pc-48dg-4kad" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.11.dfsg-2%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943953?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" }, { "vulnerability": "VCID-v6pc-48dg-4kad" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.13.dfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943958?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943956?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943957?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.2-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-9842" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m6xx-a91r-sbhu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56188?format=api", "vulnerability_id": "VCID-mr6h-6jrp-gyf3", "summary": "Multiple vulnerabilities have been found in rsync, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9840.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9840.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9840", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07707", "scoring_system": "epss", "scoring_elements": "0.91936", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.13004", "scoring_system": "epss", "scoring_elements": "0.94041", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.13004", "scoring_system": "epss", "scoring_elements": "0.94097", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.13004", "scoring_system": "epss", "scoring_elements": "0.94102", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.13004", "scoring_system": "epss", "scoring_elements": "0.9405", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.13004", "scoring_system": "epss", "scoring_elements": "0.9406", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.13004", "scoring_system": "epss", "scoring_elements": "0.94064", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.13004", "scoring_system": "epss", "scoring_elements": "0.94072", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.13004", "scoring_system": "epss", "scoring_elements": "0.94076", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.13004", "scoring_system": "epss", "scoring_elements": "0.94081", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9840" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9840", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9840" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:S/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402345", "reference_id": "1402345", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402345" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=847270", "reference_id": "847270", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=847270" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924509", "reference_id": "924509", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924509" }, { "reference_url": "https://security.gentoo.org/glsa/201701-56", "reference_id": "GLSA-201701-56", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-56" }, { "reference_url": "https://security.gentoo.org/glsa/202007-54", "reference_id": "GLSA-202007-54", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-54" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1220", "reference_id": "RHSA-2017:1220", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1220" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1221", "reference_id": "RHSA-2017:1221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1221" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1222", "reference_id": "RHSA-2017:1222", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1222" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2999", "reference_id": "RHSA-2017:2999", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2999" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3046", "reference_id": "RHSA-2017:3046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3047", "reference_id": "RHSA-2017:3047", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3047" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453", "reference_id": "RHSA-2017:3453", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3453" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10541", "reference_id": "RHSA-2025:10541", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10541" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:11048", "reference_id": "RHSA-2025:11048", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:11048" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:12013", "reference_id": "RHSA-2025:12013", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:12013" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13947", "reference_id": "RHSA-2025:13947", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13947" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8284", "reference_id": "RHSA-2025:8284", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8284" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8314", "reference_id": "RHSA-2025:8314", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8314" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8395", "reference_id": "RHSA-2025:8395", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8395" }, { "reference_url": "https://usn.ubuntu.com/4246-1/", "reference_id": "USN-4246-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4246-1/" }, { "reference_url": "https://usn.ubuntu.com/4292-1/", "reference_id": "USN-4292-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4292-1/" }, { "reference_url": "https://usn.ubuntu.com/6736-1/", "reference_id": "USN-6736-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6736-1/" }, { "reference_url": "https://usn.ubuntu.com/6736-2/", "reference_id": "USN-6736-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6736-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943962?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.8.dfsg-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.8.dfsg-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943955?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" }, { "vulnerability": "VCID-v6pc-48dg-4kad" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.11.dfsg-2%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943953?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" }, { "vulnerability": "VCID-v6pc-48dg-4kad" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.13.dfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943958?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943956?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943957?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.2-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-9840" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mr6h-6jrp-gyf3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57323?format=api", "vulnerability_id": "VCID-s8dx-tft2-nfg6", "summary": "The zlib library contains a Denial of Service vulnerability.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0797", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02112", "scoring_system": "epss", "scoring_elements": "0.84042", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02112", "scoring_system": "epss", "scoring_elements": "0.84055", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02112", "scoring_system": "epss", "scoring_elements": "0.84072", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02112", "scoring_system": "epss", "scoring_elements": "0.84073", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02112", "scoring_system": "epss", "scoring_elements": "0.84097", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02112", "scoring_system": "epss", "scoring_elements": "0.84103", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02112", "scoring_system": "epss", "scoring_elements": "0.8412", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02112", "scoring_system": "epss", "scoring_elements": "0.84115", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02112", "scoring_system": "epss", "scoring_elements": "0.8411", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02112", "scoring_system": "epss", "scoring_elements": "0.84133", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02112", "scoring_system": "epss", "scoring_elements": "0.84134", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02112", "scoring_system": "epss", "scoring_elements": "0.84138", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0797" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0797", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0797" }, { "reference_url": "https://security.gentoo.org/glsa/200408-26", "reference_id": "GLSA-200408-26", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200408-26" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943959?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.1.1-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.1.1-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943955?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" }, { "vulnerability": "VCID-v6pc-48dg-4kad" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.11.dfsg-2%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943953?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" }, { "vulnerability": "VCID-v6pc-48dg-4kad" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.13.dfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943958?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943956?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943957?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.2-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2004-0797" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s8dx-tft2-nfg6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56191?format=api", "vulnerability_id": "VCID-smft-ms93-6kf1", "summary": "Multiple vulnerabilities have been found in rsync, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9843.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9843.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9843", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.15071", "scoring_system": "epss", "scoring_elements": "0.9454", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.15071", "scoring_system": "epss", "scoring_elements": "0.94547", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.15071", "scoring_system": "epss", "scoring_elements": "0.94555", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.15071", "scoring_system": "epss", "scoring_elements": "0.94557", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.15071", "scoring_system": "epss", "scoring_elements": "0.94567", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.15071", "scoring_system": "epss", "scoring_elements": "0.94571", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.15071", "scoring_system": "epss", "scoring_elements": "0.94575", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.15071", "scoring_system": "epss", "scoring_elements": "0.94577", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.15071", "scoring_system": "epss", "scoring_elements": "0.94578", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.15071", "scoring_system": "epss", "scoring_elements": "0.9459", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.15071", "scoring_system": "epss", "scoring_elements": "0.94595", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.15071", "scoring_system": "epss", "scoring_elements": "0.94599", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9843" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9843", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9843" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:S/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402351", "reference_id": "1402351", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402351" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=847275", "reference_id": "847275", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=847275" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924509", "reference_id": "924509", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924509" }, { "reference_url": "https://security.gentoo.org/glsa/201701-56", "reference_id": "GLSA-201701-56", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201701-56" }, { "reference_url": "https://security.gentoo.org/glsa/202007-54", "reference_id": "GLSA-202007-54", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-54" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1220", "reference_id": "RHSA-2017:1220", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1220" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1221", "reference_id": "RHSA-2017:1221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1221" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1222", "reference_id": "RHSA-2017:1222", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1222" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:2999", "reference_id": "RHSA-2017:2999", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:2999" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3046", "reference_id": "RHSA-2017:3046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3047", "reference_id": "RHSA-2017:3047", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3047" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:3453", "reference_id": "RHSA-2017:3453", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:3453" }, { "reference_url": "https://usn.ubuntu.com/4246-1/", "reference_id": "USN-4246-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4246-1/" }, { "reference_url": "https://usn.ubuntu.com/4292-1/", "reference_id": "USN-4292-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4292-1/" }, { "reference_url": "https://usn.ubuntu.com/7959-1/", "reference_id": "USN-7959-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7959-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943962?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.8.dfsg-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.8.dfsg-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943955?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" }, { "vulnerability": "VCID-v6pc-48dg-4kad" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.11.dfsg-2%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943953?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" }, { "vulnerability": "VCID-v6pc-48dg-4kad" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.13.dfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943958?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943956?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943957?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.2-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-9843" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-smft-ms93-6kf1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47390?format=api", "vulnerability_id": "VCID-sn99-6y6w-ybc6", "summary": "Pngcrush is vulnerable to a buffer overflow which could potentially lead to\n the execution of arbitrary code.", "references": [ { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.6/SCOSA-2006.6.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.6/SCOSA-2006.6.txt" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1849.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1849.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-1849", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07988", "scoring_system": "epss", "scoring_elements": "0.92094", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.07988", "scoring_system": "epss", "scoring_elements": "0.92053", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07988", "scoring_system": "epss", "scoring_elements": "0.92059", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07988", "scoring_system": "epss", "scoring_elements": "0.92067", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07988", "scoring_system": "epss", "scoring_elements": "0.92071", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07988", "scoring_system": "epss", "scoring_elements": "0.92083", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07988", "scoring_system": "epss", "scoring_elements": "0.92087", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07988", "scoring_system": "epss", "scoring_elements": "0.9209", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07988", "scoring_system": "epss", "scoring_elements": "0.92086", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07988", "scoring_system": "epss", "scoring_elements": "0.92097", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07988", "scoring_system": "epss", "scoring_elements": "0.92095", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-1849" }, { "reference_url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162680", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162680" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1849", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1849" }, { "reference_url": "http://secunia.com/advisories/16137", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/16137" }, { "reference_url": "http://secunia.com/advisories/17326", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17326" }, { "reference_url": "http://secunia.com/advisories/17516", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17516" }, { "reference_url": "http://secunia.com/advisories/18377", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18377" }, { "reference_url": "http://secunia.com/advisories/19334", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19334" }, { "reference_url": "http://secunia.com/advisories/19550", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19550" }, { "reference_url": "http://secunia.com/advisories/19597", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19597" }, { "reference_url": "http://secunia.com/advisories/24788", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24788" }, { "reference_url": "http://secunia.com/advisories/31492", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/31492" }, { "reference_url": "http://security.debian.org/pool/updates/main/z/zlib/zlib_1.2.2-4.sarge.2.diff.gz", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.debian.org/pool/updates/main/z/zlib/zlib_1.2.2-4.sarge.2.diff.gz" }, { "reference_url": "http://securitytracker.com/id?1014540", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1014540" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21456", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21456" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11402", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11402" }, { "reference_url": "http://www.debian.org/security/2005/dsa-763", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-763" }, { "reference_url": "http://www.debian.org/security/2005/dsa-797", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-797" }, { "reference_url": "http://www.debian.org/security/2006/dsa-1026", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-1026" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200509-18.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200509-18.xml" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200603-18.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200603-18.xml" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:196", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:196" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:070", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:070" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2005_43_zlib.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2005_43_zlib.html" }, { "reference_url": "http://www.osvdb.org/18141", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.osvdb.org/18141" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-584.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-584.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2008-0629.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/464745/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/464745/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/14340", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/14340" }, { "reference_url": "http://www.ubuntulinux.org/usn/usn-151-3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntulinux.org/usn/usn-151-3" }, { "reference_url": "http://www.vmware.com/support/vi3/doc/esx-3616065-patch.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/support/vi3/doc/esx-3616065-patch.html" }, { "reference_url": "http://www.vmware.com/support/vi3/doc/esx-9916286-patch.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/support/vi3/doc/esx-9916286-patch.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/1267", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/1267" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649", "reference_id": "430649", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=430649" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zlib:zlib:1.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zlib:zlib:1.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zlib:zlib:1.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849", "reference_id": "CVE-2005-1849", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1849" }, { "reference_url": "https://security.gentoo.org/glsa/200603-18", "reference_id": "GLSA-200603-18", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200603-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:584", "reference_id": "RHSA-2005:584", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:584" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0264", "reference_id": "RHSA-2008:0264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0264" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0525", "reference_id": "RHSA-2008:0525", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0525" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0629", "reference_id": "RHSA-2008:0629", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0629" }, { "reference_url": "https://usn.ubuntu.com/151-1/", "reference_id": "USN-151-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/151-1/" }, { "reference_url": "https://usn.ubuntu.com/151-2/", "reference_id": "USN-151-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/151-2/" }, { "reference_url": "https://usn.ubuntu.com/151-3/", "reference_id": "USN-151-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/151-3/" }, { "reference_url": "https://usn.ubuntu.com/151-4/", "reference_id": "USN-151-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/151-4/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943960?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943955?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" }, { "vulnerability": "VCID-v6pc-48dg-4kad" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.11.dfsg-2%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943953?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" }, { "vulnerability": "VCID-v6pc-48dg-4kad" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.13.dfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943958?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943956?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943957?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.2-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2005-1849" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sn99-6y6w-ybc6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/13518?format=api", "vulnerability_id": "VCID-xd6j-x83x-r3gn", "summary": "Out-of-bounds Write\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-25032.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-25032.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-25032", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.24102", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.23937", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00081", "scoring_system": "epss", "scoring_elements": "0.24064", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25311", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25364", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25406", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.2535", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25282", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25394", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.2528", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25309", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25318", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-25032" }, { "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/" } ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032" }, { "reference_url": "http://seclists.org/fulldisclosure/2022/May/33", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/" } ], "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "reference_url": "http://seclists.org/fulldisclosure/2022/May/35", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/" } ], "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "reference_url": "http://seclists.org/fulldisclosure/2022/May/38", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/" } ], "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/" } ], "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531" }, { "reference_url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/" } ], "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12" }, { "reference_url": "https://github.com/madler/zlib/issues/605", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/" } ], "url": "https://github.com/madler/zlib/issues/605" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" }, { "reference_url": "https://security.gentoo.org/glsa/202210-42", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/" } ], "url": "https://security.gentoo.org/glsa/202210-42" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220526-0009", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20220526-0009" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220526-0009/", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220526-0009/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220729-0004", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20220729-0004" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220729-0004/", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220729-0004/" }, { "reference_url": "https://support.apple.com/kb/HT213255", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/" } ], "url": "https://support.apple.com/kb/HT213255" }, { "reference_url": "https://support.apple.com/kb/HT213256", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/" } ], "url": "https://support.apple.com/kb/HT213256" }, { "reference_url": "https://support.apple.com/kb/HT213257", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/" } ], "url": "https://support.apple.com/kb/HT213257" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5111", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5111" }, { "reference_url": "https://www.openwall.com/lists/oss-security/2022/03/24/1", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/" } ], "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1" }, { "reference_url": "https://www.openwall.com/lists/oss-security/2022/03/28/1", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/" } ], "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1" }, { "reference_url": "https://www.openwall.com/lists/oss-security/2022/03/28/3", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/" } ], "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujul2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/" } ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/03/25/2", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/03/26/1", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008265", "reference_id": "1008265", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008265" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067945", "reference_id": "2067945", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067945" }, { "reference_url": "https://security.archlinux.org/ASA-202204-3", "reference_id": "ASA-202204-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202204-3" }, { "reference_url": "https://security.archlinux.org/AVG-2657", "reference_id": "AVG-2657", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2657" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-25032", "reference_id": "CVE-2018-25032", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-25032" }, { "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2018-25032.yml", "reference_id": "CVE-2018-25032.YML", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2018-25032.yml" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/", "reference_id": "DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/", "reference_id": "DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/" }, { "reference_url": "https://github.com/advisories/GHSA-jc36-42cf-vqwj", "reference_id": "GHSA-jc36-42cf-vqwj", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-jc36-42cf-vqwj" }, { "reference_url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5", "reference_id": "GHSA-v6gp-9mmm-c6p5", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5" }, { "reference_url": "https://security.gentoo.org/glsa/202405-22", "reference_id": "GLSA-202405-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-22" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/", "reference_id": "JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/", "reference_id": "NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1591", "reference_id": "RHSA-2022:1591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1642", "reference_id": "RHSA-2022:1642", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1642" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1661", "reference_id": "RHSA-2022:1661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:2192", "reference_id": "RHSA-2022:2192", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:2192" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:2197", "reference_id": "RHSA-2022:2197", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:2197" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:2198", "reference_id": "RHSA-2022:2198", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:2198" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:2201", "reference_id": "RHSA-2022:2201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:2201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:2213", "reference_id": "RHSA-2022:2213", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:2213" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:2214", "reference_id": "RHSA-2022:2214", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:2214" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4584", "reference_id": "RHSA-2022:4584", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4584" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4592", "reference_id": "RHSA-2022:4592", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4592" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4845", "reference_id": "RHSA-2022:4845", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4845" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4896", "reference_id": "RHSA-2022:4896", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4896" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5439", "reference_id": "RHSA-2022:5439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7144", "reference_id": "RHSA-2022:7144", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7144" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7813", "reference_id": "RHSA-2022:7813", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7813" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8420", "reference_id": "RHSA-2022:8420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8420" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0943", "reference_id": "RHSA-2023:0943", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0943" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0975", "reference_id": "RHSA-2023:0975", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0975" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0976", "reference_id": "RHSA-2023:0976", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0976" }, { "reference_url": "https://usn.ubuntu.com/5355-1/", "reference_id": "USN-5355-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5355-1/" }, { "reference_url": "https://usn.ubuntu.com/5355-2/", "reference_id": "USN-5355-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5355-2/" }, { "reference_url": "https://usn.ubuntu.com/5359-1/", "reference_id": "USN-5359-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5359-1/" }, { "reference_url": "https://usn.ubuntu.com/5359-2/", "reference_id": "USN-5359-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5359-2/" }, { "reference_url": "https://usn.ubuntu.com/5739-1/", "reference_id": "USN-5739-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5739-1/" }, { "reference_url": "https://usn.ubuntu.com/6736-1/", "reference_id": "USN-6736-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6736-1/" }, { "reference_url": "https://usn.ubuntu.com/6736-2/", "reference_id": "USN-6736-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6736-2/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/", "reference_id": "VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/", "reference_id": "XOKFMSNQ5D5WGMALBNBXU3GE442V74WU", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943965?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.11.dfsg-2%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943955?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" }, { "vulnerability": "VCID-v6pc-48dg-4kad" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.11.dfsg-2%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943964?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.11.dfsg-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.11.dfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943953?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" }, { "vulnerability": "VCID-v6pc-48dg-4kad" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.13.dfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943958?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943956?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943957?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.2-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-25032", "GHSA-jc36-42cf-vqwj" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xd6j-x83x-r3gn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89750?format=api", "vulnerability_id": "VCID-y9kk-6zyw-6qfn", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0107.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0107.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0107", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.35642", "scoring_system": "epss", "scoring_elements": "0.97039", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.35642", "scoring_system": "epss", "scoring_elements": "0.97046", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.35642", "scoring_system": "epss", "scoring_elements": "0.9705", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.35642", "scoring_system": "epss", "scoring_elements": "0.97051", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.35642", "scoring_system": "epss", "scoring_elements": "0.97061", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.35642", "scoring_system": "epss", "scoring_elements": "0.97062", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.35642", "scoring_system": "epss", "scoring_elements": "0.97065", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.35642", "scoring_system": "epss", "scoring_elements": "0.97066", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.35642", "scoring_system": "epss", "scoring_elements": "0.97076", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.35642", "scoring_system": "epss", "scoring_elements": "0.9708", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.35642", "scoring_system": "epss", "scoring_elements": "0.97084", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0107" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0107", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0107" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616967", "reference_id": "1616967", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616967" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/22273.c", "reference_id": "CVE-2003-0107;OSVDB-6599", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/22273.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/22274.c", "reference_id": "CVE-2003-0107;OSVDB-6599", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/22274.c" }, { "reference_url": "https://www.securityfocus.com/bid/6913/info", "reference_id": "CVE-2003-0107;OSVDB-6599", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/6913/info" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:079", "reference_id": "RHSA-2003:079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:081", "reference_id": "RHSA-2003:081", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:081" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943954?format=api", "purl": "pkg:deb/debian/zlib@1:1.1.4-10?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.1.4-10%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943955?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" }, { "vulnerability": "VCID-v6pc-48dg-4kad" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.11.dfsg-2%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943953?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" }, { "vulnerability": "VCID-v6pc-48dg-4kad" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.13.dfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943958?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943956?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943957?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.2-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2003-0107" ], "risk_score": 0.6, "exploitability": "2.0", "weighted_severity": "0.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y9kk-6zyw-6qfn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51055?format=api", "vulnerability_id": "VCID-ys8b-uuv1-pkfm", "summary": "A buffer overflow in zlib might allow an attacker to cause remote code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37434.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-37434.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-37434", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.92544", "scoring_system": "epss", "scoring_elements": "0.99741", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.92544", "scoring_system": "epss", "scoring_elements": "0.99739", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.92544", "scoring_system": "epss", "scoring_elements": "0.9974", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.92544", "scoring_system": "epss", "scoring_elements": "0.99736", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.92544", "scoring_system": "epss", "scoring_elements": "0.99737", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.92544", "scoring_system": "epss", "scoring_elements": "0.99738", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-37434" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37434", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37434" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/curl/curl/issues/9271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/curl/curl/issues/9271" }, { "reference_url": "https://github.com/ivd38/zlib_overflow", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/ivd38/zlib_overflow" }, { "reference_url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063" }, { "reference_url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1" }, { "reference_url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/08/05/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2022/08/05/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/08/09/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2022/08/09/1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016710", "reference_id": "1016710", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1016710" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2116639", "reference_id": "2116639", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2116639" }, { "reference_url": "https://security.archlinux.org/AVG-2821", "reference_id": "AVG-2821", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2821" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-37434", "reference_id": "CVE-2022-37434", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-37434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7106", "reference_id": "RHSA-2022:7106", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7106" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7314", "reference_id": "RHSA-2022:7314", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7314" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7793", "reference_id": "RHSA-2022:7793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7793" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8291", "reference_id": "RHSA-2022:8291", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8291" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8841", "reference_id": "RHSA-2022:8841", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8841" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1095", "reference_id": "RHSA-2023:1095", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1095" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0254", "reference_id": "RHSA-2024:0254", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0254" }, { "reference_url": "https://usn.ubuntu.com/5570-1/", "reference_id": "USN-5570-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5570-1/" }, { "reference_url": "https://usn.ubuntu.com/5570-2/", "reference_id": "USN-5570-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5570-2/" }, { "reference_url": "https://usn.ubuntu.com/5573-1/", "reference_id": "USN-5573-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5573-1/" }, { "reference_url": "https://usn.ubuntu.com/6736-1/", "reference_id": "USN-6736-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6736-1/" }, { "reference_url": "https://usn.ubuntu.com/6736-2/", "reference_id": "USN-6736-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6736-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943955?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.11.dfsg-2%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" }, { "vulnerability": "VCID-v6pc-48dg-4kad" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.11.dfsg-2%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943966?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.11.dfsg-4.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.11.dfsg-4.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943953?format=api", "purl": "pkg:deb/debian/zlib@1:1.2.13.dfsg-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" }, { "vulnerability": "VCID-v6pc-48dg-4kad" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.13.dfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943958?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943956?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.1-3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-ac5e-emja-v3fe" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.1-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943957?format=api", "purl": "pkg:deb/debian/zlib@1:1.3.dfsg%2Breally1.3.2-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.3.dfsg%252Breally1.3.2-3%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-37434" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ys8b-uuv1-pkfm" } ], "risk_score": "4.5", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zlib@1:1.2.13.dfsg-1%3Fdistro=trixie" }