{"url":"http://public2.vulnerablecode.io/api/packages/1038040?format=json","purl":"pkg:deb/debian/aspell@0.60.2%2B20050121-2","type":"deb","namespace":"debian","name":"aspell","version":"0.60.2+20050121-2","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"0.60.8-3","latest_non_vulnerable_version":"0.60.8-3","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/30950?format=json","vulnerability_id":"VCID-rtxt-2zns-byan","summary":"A vulnerability has been discovered in GNU Aspell which leads to a heap buffer overflow.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-25051.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-25051.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-25051","reference_id":"","reference_type":"","scores":[{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13823","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13652","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13767","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13736","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13905","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13962","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13764","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13846","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13898","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13855","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13819","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.1377","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13679","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13673","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.13745","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-25051"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17544","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17544"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25051","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25051"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1984066","reference_id":"1984066","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1984066"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991307","reference_id":"991307","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991307"},{"reference_url":"https://security.archlinux.org/AVG-2178","reference_id":"AVG-2178","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2178"},{"reference_url":"https://security.gentoo.org/glsa/202402-31","reference_id":"GLSA-202402-31","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-31"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1808","reference_id":"RHSA-2022:1808","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1808"},{"reference_url":"https://usn.ubuntu.com/5023-1/","reference_id":"USN-5023-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5023-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038047?format=json","purl":"pkg:deb/debian/aspell@0.60.7~20110707-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-rtxt-2zns-byan"},{"vulnerability":"VCID-rxk9-kxe4-ykau"},{"vulnerability":"VCID-vruj-xakg-fqax"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/aspell@0.60.7~20110707-6%252Bdeb10u1"},{"url":"http://public2.vulnerablecode.io/api/packages/1057905?format=json","purl":"pkg:deb/debian/aspell@0.60.8-3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/aspell@0.60.8-3"}],"aliases":["CVE-2019-25051"],"risk_score":3.5,"exploitability":"0.5","weighted_severity":"7.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rtxt-2zns-byan"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82317?format=json","vulnerability_id":"VCID-rxk9-kxe4-ykau","summary":"aspell: stack-based buffer over-read in acommon::unescape in common/getdata.cpp","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17544.json","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17544.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17544","reference_id":"","reference_type":"","scores":[{"value":"0.0036","scoring_system":"epss","scoring_elements":"0.58039","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0036","scoring_system":"epss","scoring_elements":"0.58123","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0036","scoring_system":"epss","scoring_elements":"0.58159","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0036","scoring_system":"epss","scoring_elements":"0.58125","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0036","scoring_system":"epss","scoring_elements":"0.58138","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0036","scoring_system":"epss","scoring_elements":"0.58124","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0036","scoring_system":"epss","scoring_elements":"0.58145","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0036","scoring_system":"epss","scoring_elements":"0.5812","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0036","scoring_system":"epss","scoring_elements":"0.58174","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0036","scoring_system":"epss","scoring_elements":"0.58178","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0036","scoring_system":"epss","scoring_elements":"0.58193","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0036","scoring_system":"epss","scoring_elements":"0.58169","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0036","scoring_system":"epss","scoring_elements":"0.5815","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0036","scoring_system":"epss","scoring_elements":"0.58181","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0036","scoring_system":"epss","scoring_elements":"0.58183","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-17544"},{"reference_url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16109","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16109"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17544","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17544"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25051","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25051"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/GNUAspell/aspell/commit/80fa26c74279fced8d778351cff19d1d8f44fe4e","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/GNUAspell/aspell/commit/80fa26c74279fced8d778351cff19d1d8f44fe4e"},{"reference_url":"https://github.com/GNUAspell/aspell/compare/rel-0.60.7...rel-0.60.8","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/GNUAspell/aspell/compare/rel-0.60.7...rel-0.60.8"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2019/10/msg00027.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2019/10/msg00027.html"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2021/07/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2021/07/msg00021.html"},{"reference_url":"https://www.debian.org/security/2021/dsa-4948","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2021/dsa-4948"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1765752","reference_id":"1765752","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1765752"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:aspell:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:aspell:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:aspell:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17544","reference_id":"CVE-2019-17544","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:N/A:P"},{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-17544"},{"reference_url":"https://usn.ubuntu.com/4155-1/","reference_id":"USN-4155-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4155-1/"},{"reference_url":"https://usn.ubuntu.com/4155-2/","reference_id":"USN-4155-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/4155-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038047?format=json","purl":"pkg:deb/debian/aspell@0.60.7~20110707-6%2Bdeb10u1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-rtxt-2zns-byan"},{"vulnerability":"VCID-rxk9-kxe4-ykau"},{"vulnerability":"VCID-vruj-xakg-fqax"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/aspell@0.60.7~20110707-6%252Bdeb10u1"},{"url":"http://public2.vulnerablecode.io/api/packages/1057905?format=json","purl":"pkg:deb/debian/aspell@0.60.8-3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/aspell@0.60.8-3"}],"aliases":["CVE-2019-17544"],"risk_score":4.1,"exploitability":"0.5","weighted_severity":"8.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rxk9-kxe4-ykau"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82254?format=json","vulnerability_id":"VCID-vruj-xakg-fqax","summary":"aspell: UCS-2 and UCS-4 null-terminated string handling OOB read","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20433.json","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-20433.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-20433","reference_id":"","reference_type":"","scores":[{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.70594","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.70607","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.70624","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.70601","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.70647","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.70663","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.70685","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.7067","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.70657","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.70702","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.70711","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.7069","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.70743","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00644","scoring_system":"epss","scoring_elements":"0.70753","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-20433"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20433","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20433"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1764299","reference_id":"1764299","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1764299"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935128","reference_id":"935128","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935128"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1057905?format=json","purl":"pkg:deb/debian/aspell@0.60.8-3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/aspell@0.60.8-3"}],"aliases":["CVE-2019-20433"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vruj-xakg-fqax"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/46203?format=json","vulnerability_id":"VCID-5ss1-zqsc-tbbm","summary":"A bug in the aspell utility word-list-compress can allow an attacker to\n    execute arbitrary code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0548","reference_id":"","reference_type":"","scores":[{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40038","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40187","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40211","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40135","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40188","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40199","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40174","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40155","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40205","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40175","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40096","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.39921","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.39906","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.39825","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0548"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0548","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0548"},{"reference_url":"https://security.gentoo.org/glsa/200406-14","reference_id":"GLSA-200406-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200406-14"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/669.c","reference_id":"OSVDB-7125;CVE-2004-0548","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/669.c"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1038040?format=json","purl":"pkg:deb/debian/aspell@0.60.2%2B20050121-2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-rtxt-2zns-byan"},{"vulnerability":"VCID-rxk9-kxe4-ykau"},{"vulnerability":"VCID-vruj-xakg-fqax"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/aspell@0.60.2%252B20050121-2"}],"aliases":["CVE-2004-0548"],"risk_score":null,"exploitability":"2.0","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5ss1-zqsc-tbbm"}],"risk_score":"4.1","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/aspell@0.60.2%252B20050121-2"}