{"url":"http://public2.vulnerablecode.io/api/packages/924711?format=json","purl":"pkg:deb/debian/gzip@1.12-1?distro=trixie","type":"deb","namespace":"debian","name":"gzip","version":"1.12-1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"1.13-1","latest_non_vulnerable_version":"1.13-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/91010?format=json","vulnerability_id":"VCID-1q5k-8ctf-hff7","summary":"gzexe in the gzip package on Red Hat Linux 5.0 and earlier allows local users to overwrite files of other users via a symlink attack on a temporary file.","references":[{"reference_url":"http://marc.info/?l=bugtraq&m=88603844115233&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=88603844115233&w=2"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-1999-1332","reference_id":"","reference_type":"","scores":[{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36195","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36122","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36316","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36349","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36184","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36234","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36252","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.36257","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00155","scoring_system":"epss","scoring_elements":"0.3622","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-1999-1332"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1332","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1332"},{"reference_url":"http://www.debian.org/security/2003/dsa-308","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2003/dsa-308"},{"reference_url":"http://www.iss.net/security_center/static/7241.php","reference_id":"","reference_type":"","scores":[],"url":"http://www.iss.net/security_center/static/7241.php"},{"reference_url":"http://www.osvdb.org/3812","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/3812"},{"reference_url":"http://www.redhat.com/support/errata/rh50-errata-general.html#gzip","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/rh50-errata-general.html#gzip"},{"reference_url":"http://www.securityfocus.com/bid/7845","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/7845"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:linux:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-1999-1332","reference_id":"CVE-1999-1332","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-1999-1332"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/924712?format=json","purl":"pkg:deb/debian/gzip@1.3.5-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924713?format=json","purl":"pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924711?format=json","purl":"pkg:deb/debian/gzip@1.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924714?format=json","purl":"pkg:deb/debian/gzip@1.13-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie"}],"aliases":["CVE-1999-1332"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1q5k-8ctf-hff7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57663?format=json","vulnerability_id":"VCID-1yf3-td2x-xffn","summary":"This GLSA contains notification of vulnerabilities found in several\n    Gentoo packages which have been fixed prior to January 1, 2011. The worst\n    of these vulnerabilities could lead to local privilege escalation and\n    remote code execution. Please see the package list and CVE identifiers\n    below for more information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2624.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2624.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2624","reference_id":"","reference_type":"","scores":[{"value":"0.07318","scoring_system":"epss","scoring_elements":"0.91645","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07318","scoring_system":"epss","scoring_elements":"0.91653","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07318","scoring_system":"epss","scoring_elements":"0.91658","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07318","scoring_system":"epss","scoring_elements":"0.91667","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07318","scoring_system":"epss","scoring_elements":"0.9168","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07318","scoring_system":"epss","scoring_elements":"0.91686","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07318","scoring_system":"epss","scoring_elements":"0.9169","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07318","scoring_system":"epss","scoring_elements":"0.91691","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07318","scoring_system":"epss","scoring_elements":"0.91688","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2624"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507263","reference_id":"507263","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507263"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=514711","reference_id":"514711","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=514711"},{"reference_url":"https://security.gentoo.org/glsa/201412-08","reference_id":"GLSA-201412-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-08"},{"reference_url":"https://usn.ubuntu.com/889-1/","reference_id":"USN-889-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/889-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/924719?format=json","purl":"pkg:deb/debian/gzip@1.3.12-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.12-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924713?format=json","purl":"pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924711?format=json","purl":"pkg:deb/debian/gzip@1.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924714?format=json","purl":"pkg:deb/debian/gzip@1.13-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie"}],"aliases":["CVE-2009-2624"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1yf3-td2x-xffn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49055?format=json","vulnerability_id":"VCID-3adf-qttu-3kfd","summary":"A vulnerability has been discovered in GNU Gzip and XZ Utils' grep helpers which could result in writes to arbitrary files.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1271.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1271.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1271","reference_id":"","reference_type":"","scores":[{"value":"0.00813","scoring_system":"epss","scoring_elements":"0.74254","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00813","scoring_system":"epss","scoring_elements":"0.74207","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00813","scoring_system":"epss","scoring_elements":"0.74213","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00813","scoring_system":"epss","scoring_elements":"0.7424","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00813","scoring_system":"epss","scoring_elements":"0.74212","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00813","scoring_system":"epss","scoring_elements":"0.74245","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00813","scoring_system":"epss","scoring_elements":"0.74259","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00813","scoring_system":"epss","scoring_elements":"0.74281","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00813","scoring_system":"epss","scoring_elements":"0.74261","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-1271"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009167","reference_id":"1009167","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009167"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009168","reference_id":"1009168","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009168"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073310","reference_id":"2073310","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073310"},{"reference_url":"https://www.openwall.com/lists/oss-security/2022/04/07/8","reference_id":"8","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/"}],"url":"https://www.openwall.com/lists/oss-security/2022/04/07/8"},{"reference_url":"https://security.archlinux.org/ASA-202204-7","reference_id":"ASA-202204-7","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202204-7"},{"reference_url":"https://security.archlinux.org/ASA-202204-8","reference_id":"ASA-202204-8","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202204-8"},{"reference_url":"https://security.archlinux.org/AVG-2665","reference_id":"AVG-2665","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2665"},{"reference_url":"https://security.archlinux.org/AVG-2666","reference_id":"AVG-2666","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2666"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2022-1271","reference_id":"CVE-2022-1271","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2022-1271"},{"reference_url":"https://security-tracker.debian.org/tracker/CVE-2022-1271","reference_id":"CVE-2022-1271","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/"}],"url":"https://security-tracker.debian.org/tracker/CVE-2022-1271"},{"reference_url":"https://security.gentoo.org/glsa/202209-01","reference_id":"GLSA-202209-01","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/"}],"url":"https://security.gentoo.org/glsa/202209-01"},{"reference_url":"https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html","reference_id":"msg00011.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/"}],"url":"https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20220930-0006/","reference_id":"ntap-20220930-0006","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/"}],"url":"https://security.netapp.com/advisory/ntap-20220930-0006/"},{"reference_url":"https://git.tukaani.org/?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6","reference_id":"?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/"}],"url":"https://git.tukaani.org/?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1537","reference_id":"RHSA-2022:1537","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1537"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1592","reference_id":"RHSA-2022:1592","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1592"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1665","reference_id":"RHSA-2022:1665","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1665"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1676","reference_id":"RHSA-2022:1676","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1676"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:2191","reference_id":"RHSA-2022:2191","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:2191"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4582","reference_id":"RHSA-2022:4582","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4582"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4896","reference_id":"RHSA-2022:4896","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4896"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4940","reference_id":"RHSA-2022:4940","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4940"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4991","reference_id":"RHSA-2022:4991","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4991"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4992","reference_id":"RHSA-2022:4992","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4992"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4993","reference_id":"RHSA-2022:4993","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4993"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:4994","reference_id":"RHSA-2022:4994","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:4994"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5052","reference_id":"RHSA-2022:5052","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5052"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:5439","reference_id":"RHSA-2022:5439","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:5439"},{"reference_url":"https://usn.ubuntu.com/5378-1/","reference_id":"USN-5378-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5378-1/"},{"reference_url":"https://usn.ubuntu.com/5378-2/","reference_id":"USN-5378-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5378-2/"},{"reference_url":"https://usn.ubuntu.com/5378-3/","reference_id":"USN-5378-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5378-3/"},{"reference_url":"https://usn.ubuntu.com/5378-4/","reference_id":"USN-5378-4","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5378-4/"},{"reference_url":"https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch","reference_id":"xzgrep-ZDI-CAN-16587.patch","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/"}],"url":"https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/924713?format=json","purl":"pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924711?format=json","purl":"pkg:deb/debian/gzip@1.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924714?format=json","purl":"pkg:deb/debian/gzip@1.13-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie"}],"aliases":["CVE-2022-1271"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3adf-qttu-3kfd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47647?format=json","vulnerability_id":"VCID-73ee-qa4t-gqd7","summary":"gzip is affected by multiple vulnerabilities, including buffer overflows\n    and infinite loops, possibly allowing the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4334.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4334.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4334","reference_id":"","reference_type":"","scores":[{"value":"0.09059","scoring_system":"epss","scoring_elements":"0.92644","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10427","scoring_system":"epss","scoring_elements":"0.93205","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10427","scoring_system":"epss","scoring_elements":"0.93209","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10427","scoring_system":"epss","scoring_elements":"0.93206","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10427","scoring_system":"epss","scoring_elements":"0.93196","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10427","scoring_system":"epss","scoring_elements":"0.93219","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10427","scoring_system":"epss","scoring_elements":"0.93223","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10427","scoring_system":"epss","scoring_elements":"0.93215","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4334"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4334","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4334"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618181","reference_id":"1618181","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618181"},{"reference_url":"https://security.gentoo.org/glsa/200609-13","reference_id":"GLSA-200609-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200609-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0667","reference_id":"RHSA-2006:0667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0667"},{"reference_url":"https://usn.ubuntu.com/349-1/","reference_id":"USN-349-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/349-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/924718?format=json","purl":"pkg:deb/debian/gzip@1.3.5-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-15%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924713?format=json","purl":"pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924711?format=json","purl":"pkg:deb/debian/gzip@1.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924714?format=json","purl":"pkg:deb/debian/gzip@1.13-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie"}],"aliases":["CVE-2006-4334"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-73ee-qa4t-gqd7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47650?format=json","vulnerability_id":"VCID-ensg-v8ut-4kh9","summary":"gzip is affected by multiple vulnerabilities, including buffer overflows\n    and infinite loops, possibly allowing the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4337.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4337.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4337","reference_id":"","reference_type":"","scores":[{"value":"0.02365","scoring_system":"epss","scoring_elements":"0.84868","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02365","scoring_system":"epss","scoring_elements":"0.84883","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02365","scoring_system":"epss","scoring_elements":"0.84901","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02365","scoring_system":"epss","scoring_elements":"0.84905","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02365","scoring_system":"epss","scoring_elements":"0.84928","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02365","scoring_system":"epss","scoring_elements":"0.84935","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02365","scoring_system":"epss","scoring_elements":"0.84951","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10293","scoring_system":"epss","scoring_elements":"0.9317","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10293","scoring_system":"epss","scoring_elements":"0.93172","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4337"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4337","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4337"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=220595","reference_id":"220595","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=220595"},{"reference_url":"https://security.gentoo.org/glsa/200609-13","reference_id":"GLSA-200609-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200609-13"},{"reference_url":"https://security.gentoo.org/glsa/200611-24","reference_id":"GLSA-200611-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200611-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0667","reference_id":"RHSA-2006:0667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0667"},{"reference_url":"https://usn.ubuntu.com/349-1/","reference_id":"USN-349-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/349-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/924718?format=json","purl":"pkg:deb/debian/gzip@1.3.5-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-15%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924713?format=json","purl":"pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924711?format=json","purl":"pkg:deb/debian/gzip@1.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924714?format=json","purl":"pkg:deb/debian/gzip@1.13-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie"}],"aliases":["CVE-2006-4337"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ensg-v8ut-4kh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89134?format=json","vulnerability_id":"VCID-ggpy-kzh6-dkbh","summary":"security flaw","references":[{"reference_url":"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt"},{"reference_url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305255","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305255"},{"reference_url":"http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=111402732406477&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=111402732406477&w=2"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2005-357.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2005-357.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1228.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1228.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-1228","reference_id":"","reference_type":"","scores":[{"value":"0.04585","scoring_system":"epss","scoring_elements":"0.89225","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04585","scoring_system":"epss","scoring_elements":"0.89177","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04585","scoring_system":"epss","scoring_elements":"0.89183","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04585","scoring_system":"epss","scoring_elements":"0.89198","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04585","scoring_system":"epss","scoring_elements":"0.892","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04585","scoring_system":"epss","scoring_elements":"0.89218","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04585","scoring_system":"epss","scoring_elements":"0.89223","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04585","scoring_system":"epss","scoring_elements":"0.89232","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04585","scoring_system":"epss","scoring_elements":"0.89229","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-1228"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1228","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1228"},{"reference_url":"http://secunia.com/advisories/15047","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/15047"},{"reference_url":"http://secunia.com/advisories/18100","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18100"},{"reference_url":"http://secunia.com/advisories/21253","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/21253"},{"reference_url":"http://secunia.com/advisories/22033","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/22033"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/20199","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/20199"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11057","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11057"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A170","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A170"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A382","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A382"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1"},{"reference_url":"http://www.debian.org/security/2005/dsa-752","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-752"},{"reference_url":"http://www.osvdb.org/15721","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/15721"},{"reference_url":"http://www.securityfocus.com/bid/19289","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/19289"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA06-214A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA06-214A.html"},{"reference_url":"http://www.vupen.com/english/advisories/2006/3101","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/3101"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617616","reference_id":"1617616","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617616"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-1228","reference_id":"CVE-2005-1228","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-1228"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:357","reference_id":"RHSA-2005:357","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:357"},{"reference_url":"https://usn.ubuntu.com/116-1/","reference_id":"USN-116-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/116-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/924717?format=json","purl":"pkg:deb/debian/gzip@1.3.5-10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924713?format=json","purl":"pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924711?format=json","purl":"pkg:deb/debian/gzip@1.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924714?format=json","purl":"pkg:deb/debian/gzip@1.13-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie"}],"aliases":["CVE-2005-1228"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ggpy-kzh6-dkbh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/91212?format=json","vulnerability_id":"VCID-hn43-p68p-g3d7","summary":"The (1) gzexe, (2) zdiff, and (3) znew scripts in the gzip package, as used by other packages such as ncompress, allows local users to overwrite files via a symlink attack on temporary files.  NOTE: the znew vulnerability may overlap CVE-2003-0367.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0970","reference_id":"","reference_type":"","scores":[{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26987","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27102","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27143","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27179","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.26971","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.2704","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27085","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27088","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00098","scoring_system":"epss","scoring_elements":"0.27044","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0970"},{"reference_url":"http://secunia.com/advisories/13131","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/13131"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17583","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/17583"},{"reference_url":"http://www.debian.org/security/2004/dsa-588","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2004/dsa-588"},{"reference_url":"http://www.securityfocus.com/bid/11288","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/11288"},{"reference_url":"http://www.trustix.org/errata/2004/0050","reference_id":"","reference_type":"","scores":[],"url":"http://www.trustix.org/errata/2004/0050"},{"reference_url":"http://www.zataz.net/adviso/ncompress-09052005.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.zataz.net/adviso/ncompress-09052005.txt"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=257314","reference_id":"257314","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=257314"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2004-0970","reference_id":"CVE-2004-0970","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:N/I:P/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2004-0970"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/924716?format=json","purl":"pkg:deb/debian/gzip@1.3.5-8?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-8%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924713?format=json","purl":"pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924711?format=json","purl":"pkg:deb/debian/gzip@1.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924714?format=json","purl":"pkg:deb/debian/gzip@1.13-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie"}],"aliases":["CVE-2004-0970"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hn43-p68p-g3d7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/107706?format=json","vulnerability_id":"VCID-ja6m-7d3c-k3cc","summary":"gzip before 1.3 in Solaris 8, when called with the -f or -force flags, will change the permissions of files that are hard linked to the target files, which allows local users to view or modify these files.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-1349","reference_id":"","reference_type":"","scores":[{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21469","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21639","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21696","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.2145","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21527","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21585","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21597","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21559","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21502","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-1349"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/924715?format=json","purl":"pkg:deb/debian/gzip@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924713?format=json","purl":"pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924711?format=json","purl":"pkg:deb/debian/gzip@1.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924714?format=json","purl":"pkg:deb/debian/gzip@1.13-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie"}],"aliases":["CVE-2004-1349"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ja6m-7d3c-k3cc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47651?format=json","vulnerability_id":"VCID-px24-9c2r-73cn","summary":"gzip is affected by multiple vulnerabilities, including buffer overflows\n    and infinite loops, possibly allowing the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4338.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4338.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4338","reference_id":"","reference_type":"","scores":[{"value":"0.03744","scoring_system":"epss","scoring_elements":"0.87957","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03744","scoring_system":"epss","scoring_elements":"0.87968","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03744","scoring_system":"epss","scoring_elements":"0.87982","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03744","scoring_system":"epss","scoring_elements":"0.87986","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03744","scoring_system":"epss","scoring_elements":"0.88006","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03744","scoring_system":"epss","scoring_elements":"0.88013","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03744","scoring_system":"epss","scoring_elements":"0.88023","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04679","scoring_system":"epss","scoring_elements":"0.89339","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04679","scoring_system":"epss","scoring_elements":"0.89336","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4338"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4338","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4338"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618182","reference_id":"1618182","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1618182"},{"reference_url":"https://security.gentoo.org/glsa/200609-13","reference_id":"GLSA-200609-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200609-13"},{"reference_url":"https://security.gentoo.org/glsa/200611-24","reference_id":"GLSA-200611-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200611-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0667","reference_id":"RHSA-2006:0667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0667"},{"reference_url":"https://usn.ubuntu.com/349-1/","reference_id":"USN-349-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/349-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/924718?format=json","purl":"pkg:deb/debian/gzip@1.3.5-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-15%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924713?format=json","purl":"pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924711?format=json","purl":"pkg:deb/debian/gzip@1.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924714?format=json","purl":"pkg:deb/debian/gzip@1.13-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie"}],"aliases":["CVE-2006-4338"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-px24-9c2r-73cn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89129?format=json","vulnerability_id":"VCID-uf6e-fsw6-bbbv","summary":"security flaw","references":[{"reference_url":"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt"},{"reference_url":"ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc","reference_id":"","reference_type":"","scores":[],"url":"ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc"},{"reference_url":"http://bugs.gentoo.org/show_bug.cgi?id=90626","reference_id":"","reference_type":"","scores":[],"url":"http://bugs.gentoo.org/show_bug.cgi?id=90626"},{"reference_url":"http://docs.info.apple.com/article.html?artnum=306172","reference_id":"","reference_type":"","scores":[],"url":"http://docs.info.apple.com/article.html?artnum=306172"},{"reference_url":"http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2005-357.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2005-357.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0758.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0758.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0758","reference_id":"","reference_type":"","scores":[{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.35615","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.3539","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0015","scoring_system":"epss","scoring_elements":"0.3559","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40416","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40437","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40399","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.4038","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40354","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40405","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0758"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0758","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0758"},{"reference_url":"http://secunia.com/advisories/18100","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18100"},{"reference_url":"http://secunia.com/advisories/19183","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/19183"},{"reference_url":"http://secunia.com/advisories/22033","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/22033"},{"reference_url":"http://secunia.com/advisories/26235","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/26235"},{"reference_url":"http://securitytracker.com/id?1013928","reference_id":"","reference_type":"","scores":[],"url":"http://securitytracker.com/id?1013928"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/20539","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/20539"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1081","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1081"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1107","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1107"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9797","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9797"},{"reference_url":"http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_158801__Updated_bzip2_packages_fix_security_issues.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_158801__Updated_bzip2_packages_fix_security_issues.html"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200505-05.xml","reference_id":"","reference_type":"","scores":[],"url":"http://www.gentoo.org/security/en/glsa/glsa-200505-05.xml"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:026","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:026"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:027","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:027"},{"reference_url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.002.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.002.html"},{"reference_url":"http://www.osvdb.org/16371","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/16371"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2005-474.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2005-474.html"},{"reference_url":"http://www.securityfocus.com/bid/13582","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/13582"},{"reference_url":"http://www.securityfocus.com/bid/25159","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/25159"},{"reference_url":"http://www.ubuntu.com/usn/usn-158-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-158-1"},{"reference_url":"http://www.vupen.com/english/advisories/2007/2732","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2007/2732"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617573","reference_id":"1617573","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617573"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=321286","reference_id":"321286","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=321286"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:gzip:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0758","reference_id":"CVE-2005-0758","reference_type":"","scores":[{"value":"4.6","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0758"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:357","reference_id":"RHSA-2005:357","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:357"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:474","reference_id":"RHSA-2005:474","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:474"},{"reference_url":"https://usn.ubuntu.com/158-1/","reference_id":"USN-158-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/158-1/"},{"reference_url":"https://usn.ubuntu.com/161-1/","reference_id":"USN-161-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/161-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/924717?format=json","purl":"pkg:deb/debian/gzip@1.3.5-10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924713?format=json","purl":"pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924711?format=json","purl":"pkg:deb/debian/gzip@1.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924714?format=json","purl":"pkg:deb/debian/gzip@1.13-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie"}],"aliases":["CVE-2005-0758"],"risk_score":2.0,"exploitability":"0.5","weighted_severity":"4.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uf6e-fsw6-bbbv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89143?format=json","vulnerability_id":"VCID-vj3y-4hqq-xybm","summary":"security flaw","references":[{"reference_url":"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt","reference_id":"","reference_type":"","scores":[],"url":"ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt"},{"reference_url":"http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2005-357.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2005-357.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0988.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0988.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0988","reference_id":"","reference_type":"","scores":[{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.301","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30198","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30228","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30277","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30095","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30155","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30191","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.30193","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00115","scoring_system":"epss","scoring_elements":"0.3015","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2005-0988"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0988","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0988"},{"reference_url":"http://secunia.com/advisories/18100","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/18100"},{"reference_url":"http://secunia.com/advisories/21253","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/21253"},{"reference_url":"http://secunia.com/advisories/22033","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/22033"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852","reference_id":"","reference_type":"","scores":[],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1"},{"reference_url":"http://www.debian.org/security/2005/dsa-752","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2005/dsa-752"},{"reference_url":"http://www.osvdb.org/15487","reference_id":"","reference_type":"","scores":[],"url":"http://www.osvdb.org/15487"},{"reference_url":"http://www.securityfocus.com/archive/1/394965","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/394965"},{"reference_url":"http://www.securityfocus.com/bid/12996","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/12996"},{"reference_url":"http://www.securityfocus.com/bid/19289","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/19289"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA06-214A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA06-214A.html"},{"reference_url":"http://www.vupen.com/english/advisories/2006/3101","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2006/3101"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617595","reference_id":"1617595","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1617595"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.0:releng:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.0:releng:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.0:releng:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.10:release:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.10:release:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.10:release:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.10:release_p8:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.10:release_p8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.10:release_p8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.10:releng:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.10:releng:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.10:releng:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.1.1:release:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.1.1:release:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.1.1:release:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.11:release_p3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.11:release_p3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.11:release_p3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.11:releng:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.11:releng:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.11:releng:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.11:stable:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.11:stable:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.11:stable:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.2:stable:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.2:stable:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.2:stable:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:release:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.3:release:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:release:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:release_p38:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.3:release_p38:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:release_p38:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:releng:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.3:releng:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:releng:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:stable:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.3:stable:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:stable:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:stable:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.6:stable:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:stable:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:release:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.7:release:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:release:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:stable:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.7:stable:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:stable:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.8:pre-release:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.8:pre-release:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.8:pre-release:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.8:release_p6:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.8:release_p6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.8:release_p6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.9:pre-release:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.9:pre-release:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.9:pre-release:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.9:releng:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:4.9:releng:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.9:releng:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:alpha:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:5.1:alpha:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:alpha:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.2.1:releng:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:5.2.1:releng:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.2.1:releng:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*","reference_id":"cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*","reference_id":"cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0988","reference_id":"CVE-2005-0988","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:P/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-0988"},{"reference_url":"https://access.redhat.com/errata/RHSA-2005:357","reference_id":"RHSA-2005:357","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2005:357"},{"reference_url":"https://usn.ubuntu.com/116-1/","reference_id":"USN-116-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/116-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/924717?format=json","purl":"pkg:deb/debian/gzip@1.3.5-10?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-10%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924713?format=json","purl":"pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924711?format=json","purl":"pkg:deb/debian/gzip@1.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924714?format=json","purl":"pkg:deb/debian/gzip@1.13-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie"}],"aliases":["CVE-2005-0988"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vj3y-4hqq-xybm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/57806?format=json","vulnerability_id":"VCID-vm8g-v83d-mbfm","summary":"This GLSA contains notification of vulnerabilities found in several\n    Gentoo packages which have been fixed prior to January 1, 2011. The worst\n    of these vulnerabilities could lead to local privilege escalation and\n    remote code execution. Please see the package list and CVE identifiers\n    below for more information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0001.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0001.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0001","reference_id":"","reference_type":"","scores":[{"value":"0.22601","scoring_system":"epss","scoring_elements":"0.95813","published_at":"2026-04-01T12:55:00Z"},{"value":"0.22601","scoring_system":"epss","scoring_elements":"0.95822","published_at":"2026-04-02T12:55:00Z"},{"value":"0.22601","scoring_system":"epss","scoring_elements":"0.9583","published_at":"2026-04-04T12:55:00Z"},{"value":"0.22601","scoring_system":"epss","scoring_elements":"0.95832","published_at":"2026-04-07T12:55:00Z"},{"value":"0.22601","scoring_system":"epss","scoring_elements":"0.95841","published_at":"2026-04-08T12:55:00Z"},{"value":"0.22601","scoring_system":"epss","scoring_elements":"0.95845","published_at":"2026-04-09T12:55:00Z"},{"value":"0.22601","scoring_system":"epss","scoring_elements":"0.95848","published_at":"2026-04-12T12:55:00Z"},{"value":"0.22601","scoring_system":"epss","scoring_elements":"0.95849","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2010-0001"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0001","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0001"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=554418","reference_id":"554418","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=554418"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=566002","reference_id":"566002","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=566002"},{"reference_url":"https://security.gentoo.org/glsa/201412-08","reference_id":"GLSA-201412-08","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201412-08"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0061","reference_id":"RHSA-2010:0061","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0061"},{"reference_url":"https://usn.ubuntu.com/889-1/","reference_id":"USN-889-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/889-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/924720?format=json","purl":"pkg:deb/debian/gzip@1.3.12-9?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.12-9%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924713?format=json","purl":"pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924711?format=json","purl":"pkg:deb/debian/gzip@1.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924714?format=json","purl":"pkg:deb/debian/gzip@1.13-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie"}],"aliases":["CVE-2010-0001"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vm8g-v83d-mbfm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/89663?format=json","vulnerability_id":"VCID-w9ut-ky8t-sqar","summary":"gzip: symlink attack on temporary files leads to arbitrary file overwrite","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0367.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0367.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0367","reference_id":"","reference_type":"","scores":[{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33986","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34325","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34353","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34218","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34261","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34291","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.3425","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34227","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2003-0367"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0367","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0367"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1850889","reference_id":"1850889","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1850889"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/924712?format=json","purl":"pkg:deb/debian/gzip@1.3.5-6?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-6%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924713?format=json","purl":"pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924711?format=json","purl":"pkg:deb/debian/gzip@1.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924714?format=json","purl":"pkg:deb/debian/gzip@1.13-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie"}],"aliases":["CVE-2003-0367"],"risk_score":2.8,"exploitability":"0.5","weighted_severity":"5.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w9ut-ky8t-sqar"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/36507?format=json","vulnerability_id":"VCID-xpf8-3pr7-dyew","summary":"gzip contain a bug potentially allowing an attacker to execute arbitrary\n    commands.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0603.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0603.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0603","reference_id":"","reference_type":"","scores":[{"value":"0.02503","scoring_system":"epss","scoring_elements":"0.85278","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02503","scoring_system":"epss","scoring_elements":"0.8529","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02503","scoring_system":"epss","scoring_elements":"0.85309","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02503","scoring_system":"epss","scoring_elements":"0.85311","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02503","scoring_system":"epss","scoring_elements":"0.85333","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02503","scoring_system":"epss","scoring_elements":"0.85341","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02503","scoring_system":"epss","scoring_elements":"0.85355","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02503","scoring_system":"epss","scoring_elements":"0.85353","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02503","scoring_system":"epss","scoring_elements":"0.8535","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2004-0603"},{"reference_url":"https://security.gentoo.org/glsa/200406-18","reference_id":"GLSA-200406-18","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200406-18"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/924715?format=json","purl":"pkg:deb/debian/gzip@0?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@0%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924713?format=json","purl":"pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924711?format=json","purl":"pkg:deb/debian/gzip@1.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924714?format=json","purl":"pkg:deb/debian/gzip@1.13-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie"}],"aliases":["CVE-2004-0603"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xpf8-3pr7-dyew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47649?format=json","vulnerability_id":"VCID-z31n-qyzz-rfhy","summary":"gzip is affected by multiple vulnerabilities, including buffer overflows\n    and infinite loops, possibly allowing the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4336.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4336.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4336","reference_id":"","reference_type":"","scores":[{"value":"0.02573","scoring_system":"epss","scoring_elements":"0.85478","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02573","scoring_system":"epss","scoring_elements":"0.8549","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02573","scoring_system":"epss","scoring_elements":"0.85507","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02573","scoring_system":"epss","scoring_elements":"0.85511","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02573","scoring_system":"epss","scoring_elements":"0.85531","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02573","scoring_system":"epss","scoring_elements":"0.8554","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02573","scoring_system":"epss","scoring_elements":"0.85554","published_at":"2026-04-11T12:55:00Z"},{"value":"0.13836","scoring_system":"epss","scoring_elements":"0.94291","published_at":"2026-04-12T12:55:00Z"},{"value":"0.13836","scoring_system":"epss","scoring_elements":"0.94292","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4336"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4336","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4336"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=220595","reference_id":"220595","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=220595"},{"reference_url":"https://security.gentoo.org/glsa/200609-13","reference_id":"GLSA-200609-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200609-13"},{"reference_url":"https://security.gentoo.org/glsa/200611-24","reference_id":"GLSA-200611-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200611-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0667","reference_id":"RHSA-2006:0667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0667"},{"reference_url":"https://usn.ubuntu.com/349-1/","reference_id":"USN-349-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/349-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/924718?format=json","purl":"pkg:deb/debian/gzip@1.3.5-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-15%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924713?format=json","purl":"pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924711?format=json","purl":"pkg:deb/debian/gzip@1.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924714?format=json","purl":"pkg:deb/debian/gzip@1.13-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie"}],"aliases":["CVE-2006-4336"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z31n-qyzz-rfhy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47648?format=json","vulnerability_id":"VCID-z6cd-db4j-2uey","summary":"gzip is affected by multiple vulnerabilities, including buffer overflows\n    and infinite loops, possibly allowing the execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4335.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4335.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4335","reference_id":"","reference_type":"","scores":[{"value":"0.009","scoring_system":"epss","scoring_elements":"0.7561","published_at":"2026-04-01T12:55:00Z"},{"value":"0.009","scoring_system":"epss","scoring_elements":"0.75612","published_at":"2026-04-02T12:55:00Z"},{"value":"0.009","scoring_system":"epss","scoring_elements":"0.75643","published_at":"2026-04-04T12:55:00Z"},{"value":"0.009","scoring_system":"epss","scoring_elements":"0.75622","published_at":"2026-04-07T12:55:00Z"},{"value":"0.009","scoring_system":"epss","scoring_elements":"0.75656","published_at":"2026-04-08T12:55:00Z"},{"value":"0.009","scoring_system":"epss","scoring_elements":"0.75668","published_at":"2026-04-09T12:55:00Z"},{"value":"0.009","scoring_system":"epss","scoring_elements":"0.75692","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03561","scoring_system":"epss","scoring_elements":"0.87708","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03561","scoring_system":"epss","scoring_elements":"0.87706","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2006-4335"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4335","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4335"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=220595","reference_id":"220595","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=220595"},{"reference_url":"https://security.gentoo.org/glsa/200609-13","reference_id":"GLSA-200609-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200609-13"},{"reference_url":"https://security.gentoo.org/glsa/200611-24","reference_id":"GLSA-200611-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200611-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2006:0667","reference_id":"RHSA-2006:0667","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2006:0667"},{"reference_url":"https://usn.ubuntu.com/349-1/","reference_id":"USN-349-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/349-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/924718?format=json","purl":"pkg:deb/debian/gzip@1.3.5-15?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-15%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924713?format=json","purl":"pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924711?format=json","purl":"pkg:deb/debian/gzip@1.12-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/924714?format=json","purl":"pkg:deb/debian/gzip@1.13-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie"}],"aliases":["CVE-2006-4335"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z6cd-db4j-2uey"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie"}