Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-xgfe-d1s6-eufu
Summary
GnuPG is vulnerable to an integer overflow that could lead to the execution
    of arbitrary code.
Aliases
0
alias CVE-2006-3746
Fixed_packages
0
url pkg:deb/debian/gnupg2@1.9.20-2?distro=trixie
purl pkg:deb/debian/gnupg2@1.9.20-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnupg2@1.9.20-2%3Fdistro=trixie
1
url pkg:deb/debian/gnupg2@2.0.0-5.2
purl pkg:deb/debian/gnupg2@2.0.0-5.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3jt3-2y11-yuc5
1
vulnerability VCID-3vdu-cchd-ekcp
2
vulnerability VCID-9cm4-mu3q-2yey
3
vulnerability VCID-9jj4-5uem-kkbs
4
vulnerability VCID-ba35-1hmw-m3hg
5
vulnerability VCID-e1yx-b7wn-83af
6
vulnerability VCID-mhw6-1d6f-pbcp
7
vulnerability VCID-n34c-87th-d7gz
8
vulnerability VCID-nfzs-w4pe-bubj
9
vulnerability VCID-ng6k-ru7r-9kdp
10
vulnerability VCID-qapz-hmnm-x7dd
11
vulnerability VCID-rqt5-xvxx-47h6
12
vulnerability VCID-st4p-dn2v-dbg3
13
vulnerability VCID-vmyv-5rvk-akh3
14
vulnerability VCID-zytz-gsnc-yqh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnupg2@2.0.0-5.2
2
url pkg:deb/debian/gnupg2@2.2.27-2%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/gnupg2@2.2.27-2%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zx65-nc6s-8yf9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnupg2@2.2.27-2%252Bdeb11u2%3Fdistro=trixie
3
url pkg:deb/debian/gnupg2@2.2.40-1.1%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/gnupg2@2.2.40-1.1%2Bdeb12u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-zx65-nc6s-8yf9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnupg2@2.2.40-1.1%252Bdeb12u2%3Fdistro=trixie
4
url pkg:deb/debian/gnupg2@2.4.7-21%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/gnupg2@2.4.7-21%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-79fy-gfr6-zkgq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnupg2@2.4.7-21%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/gnupg2@2.4.9-4?distro=trixie
purl pkg:deb/debian/gnupg2@2.4.9-4?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-79fy-gfr6-zkgq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnupg2@2.4.9-4%3Fdistro=trixie
6
url pkg:ebuild/app-crypt/gnupg@1.4.5
purl pkg:ebuild/app-crypt/gnupg@1.4.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/gnupg@1.4.5
Affected_packages
0
url pkg:deb/debian/gnupg2@1.9.15-6sarge2
purl pkg:deb/debian/gnupg2@1.9.15-6sarge2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3jt3-2y11-yuc5
1
vulnerability VCID-3vdu-cchd-ekcp
2
vulnerability VCID-4jxu-65cg-gbag
3
vulnerability VCID-9cm4-mu3q-2yey
4
vulnerability VCID-9jj4-5uem-kkbs
5
vulnerability VCID-ba35-1hmw-m3hg
6
vulnerability VCID-c2pw-ysyx-q7an
7
vulnerability VCID-e1yx-b7wn-83af
8
vulnerability VCID-mhw6-1d6f-pbcp
9
vulnerability VCID-n34c-87th-d7gz
10
vulnerability VCID-nfzs-w4pe-bubj
11
vulnerability VCID-ng6k-ru7r-9kdp
12
vulnerability VCID-qapz-hmnm-x7dd
13
vulnerability VCID-rqt5-xvxx-47h6
14
vulnerability VCID-st4p-dn2v-dbg3
15
vulnerability VCID-vmyv-5rvk-akh3
16
vulnerability VCID-xgfe-d1s6-eufu
17
vulnerability VCID-y6zm-whbe-gfg4
18
vulnerability VCID-zytz-gsnc-yqh9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnupg2@1.9.15-6sarge2
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3746.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3746.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-3746
reference_id
reference_type
scores
0
value 0.35261
scoring_system epss
scoring_elements 0.97012
published_at 2026-04-01T12:55:00Z
1
value 0.35261
scoring_system epss
scoring_elements 0.9702
published_at 2026-04-02T12:55:00Z
2
value 0.35261
scoring_system epss
scoring_elements 0.97023
published_at 2026-04-04T12:55:00Z
3
value 0.35261
scoring_system epss
scoring_elements 0.97024
published_at 2026-04-07T12:55:00Z
4
value 0.35261
scoring_system epss
scoring_elements 0.97033
published_at 2026-04-08T12:55:00Z
5
value 0.35261
scoring_system epss
scoring_elements 0.97034
published_at 2026-04-09T12:55:00Z
6
value 0.35261
scoring_system epss
scoring_elements 0.97038
published_at 2026-04-13T12:55:00Z
7
value 0.35261
scoring_system epss
scoring_elements 0.97049
published_at 2026-04-16T12:55:00Z
8
value 0.35261
scoring_system epss
scoring_elements 0.97052
published_at 2026-04-18T12:55:00Z
9
value 0.35261
scoring_system epss
scoring_elements 0.97057
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-3746
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3746
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=200502
reference_id 200502
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=200502
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/28257.txt
reference_id CVE-2006-3746;OSVDB-27664
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/28257.txt
5
reference_url https://www.securityfocus.com/bid/19110/info
reference_id CVE-2006-3746;OSVDB-27664
reference_type exploit
scores
url https://www.securityfocus.com/bid/19110/info
6
reference_url https://security.gentoo.org/glsa/200608-08
reference_id GLSA-200608-08
reference_type
scores
url https://security.gentoo.org/glsa/200608-08
7
reference_url https://access.redhat.com/errata/RHSA-2006:0615
reference_id RHSA-2006:0615
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0615
8
reference_url https://usn.ubuntu.com/332-1/
reference_id USN-332-1
reference_type
scores
url https://usn.ubuntu.com/332-1/
Weaknesses
Exploits
0
date_added 2006-07-22
description GnuPG 1.4/1.9 - Parse_Comment Remote Buffer Overflow
required_action null
due_date null
notes null
known_ransomware_campaign_use true
source_date_published 2006-07-22
exploit_type dos
platform linux
source_date_updated 2013-09-13
data_source Exploit-DB
source_url https://www.securityfocus.com/bid/19110/info
Severity_range_scorenull
Exploitability2.0
Weighted_severity0.3
Risk_score0.6
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-xgfe-d1s6-eufu