Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/924714?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/924714?format=api", "purl": "pkg:deb/debian/gzip@1.13-1?distro=trixie", "type": "deb", "namespace": "debian", "name": "gzip", "version": "1.13-1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91010?format=api", "vulnerability_id": "VCID-1q5k-8ctf-hff7", "summary": "gzexe in the gzip package on Red Hat Linux 5.0 and earlier allows local users to overwrite files of other users via a symlink attack on a temporary file.", "references": [ { "reference_url": "http://marc.info/?l=bugtraq&m=88603844115233&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=88603844115233&w=2" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-1999-1332", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36195", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36122", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36316", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36349", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36184", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36234", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36252", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.36257", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00155", "scoring_system": "epss", "scoring_elements": "0.3622", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-1999-1332" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1332", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-1332" }, { "reference_url": "http://www.debian.org/security/2003/dsa-308", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2003/dsa-308" }, { "reference_url": "http://www.iss.net/security_center/static/7241.php", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.iss.net/security_center/static/7241.php" }, { "reference_url": "http://www.osvdb.org/3812", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.osvdb.org/3812" }, { "reference_url": "http://www.redhat.com/support/errata/rh50-errata-general.html#gzip", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/rh50-errata-general.html#gzip" }, { "reference_url": "http://www.securityfocus.com/bid/7845", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/7845" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-1999-1332", "reference_id": "CVE-1999-1332", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-1999-1332" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924712?format=api", "purl": "pkg:deb/debian/gzip@1.3.5-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924713?format=api", "purl": "pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924711?format=api", "purl": "pkg:deb/debian/gzip@1.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924714?format=api", "purl": "pkg:deb/debian/gzip@1.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-1999-1332" ], "risk_score": 0.9, "exploitability": "0.5", "weighted_severity": "1.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1q5k-8ctf-hff7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57663?format=api", "vulnerability_id": "VCID-1yf3-td2x-xffn", "summary": "This GLSA contains notification of vulnerabilities found in several\n Gentoo packages which have been fixed prior to January 1, 2011. The worst\n of these vulnerabilities could lead to local privilege escalation and\n remote code execution. Please see the package list and CVE identifiers\n below for more information.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2624.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2624.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2624", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07318", "scoring_system": "epss", "scoring_elements": "0.91645", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07318", "scoring_system": "epss", "scoring_elements": "0.91653", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07318", "scoring_system": "epss", "scoring_elements": "0.91658", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07318", "scoring_system": "epss", "scoring_elements": "0.91667", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07318", "scoring_system": "epss", "scoring_elements": "0.9168", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07318", "scoring_system": "epss", "scoring_elements": "0.91686", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07318", "scoring_system": "epss", "scoring_elements": "0.9169", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07318", "scoring_system": "epss", "scoring_elements": "0.91691", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07318", "scoring_system": "epss", "scoring_elements": "0.91688", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2624" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507263", "reference_id": "507263", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507263" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=514711", "reference_id": "514711", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=514711" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" }, { "reference_url": "https://usn.ubuntu.com/889-1/", "reference_id": "USN-889-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/889-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924719?format=api", "purl": "pkg:deb/debian/gzip@1.3.12-8?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.12-8%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924713?format=api", "purl": "pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924711?format=api", "purl": "pkg:deb/debian/gzip@1.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924714?format=api", "purl": "pkg:deb/debian/gzip@1.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-2624" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1yf3-td2x-xffn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49055?format=api", "vulnerability_id": "VCID-3adf-qttu-3kfd", "summary": "A vulnerability has been discovered in GNU Gzip and XZ Utils' grep helpers which could result in writes to arbitrary files.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1271.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1271.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1271", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00813", "scoring_system": "epss", "scoring_elements": "0.74254", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00813", "scoring_system": "epss", "scoring_elements": "0.74207", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00813", "scoring_system": "epss", "scoring_elements": "0.74213", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00813", "scoring_system": "epss", "scoring_elements": "0.7424", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00813", "scoring_system": "epss", "scoring_elements": "0.74212", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00813", "scoring_system": "epss", "scoring_elements": "0.74245", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00813", "scoring_system": "epss", "scoring_elements": "0.74259", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00813", "scoring_system": "epss", "scoring_elements": "0.74281", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00813", "scoring_system": "epss", "scoring_elements": "0.74261", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1271" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009167", "reference_id": "1009167", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009167" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009168", "reference_id": "1009168", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009168" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073310", "reference_id": "2073310", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073310" }, { "reference_url": "https://www.openwall.com/lists/oss-security/2022/04/07/8", "reference_id": "8", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/" } ], "url": "https://www.openwall.com/lists/oss-security/2022/04/07/8" }, { "reference_url": "https://security.archlinux.org/ASA-202204-7", "reference_id": "ASA-202204-7", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202204-7" }, { "reference_url": "https://security.archlinux.org/ASA-202204-8", "reference_id": "ASA-202204-8", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202204-8" }, { "reference_url": "https://security.archlinux.org/AVG-2665", "reference_id": "AVG-2665", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2665" }, { "reference_url": "https://security.archlinux.org/AVG-2666", "reference_id": "AVG-2666", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2666" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2022-1271", "reference_id": "CVE-2022-1271", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2022-1271" }, { "reference_url": "https://security-tracker.debian.org/tracker/CVE-2022-1271", "reference_id": "CVE-2022-1271", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/" } ], "url": "https://security-tracker.debian.org/tracker/CVE-2022-1271" }, { "reference_url": "https://security.gentoo.org/glsa/202209-01", "reference_id": "GLSA-202209-01", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/" } ], "url": "https://security.gentoo.org/glsa/202209-01" }, { "reference_url": "https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html", "reference_id": "msg00011.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/" } ], "url": "https://lists.gnu.org/r/bug-gzip/2022-04/msg00011.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220930-0006/", "reference_id": "ntap-20220930-0006", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220930-0006/" }, { "reference_url": "https://git.tukaani.org/?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6", "reference_id": "?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/" } ], "url": "https://git.tukaani.org/?p=xz.git%3Ba=commit%3Bh=69d1b3fc29677af8ade8dc15dba83f0589cb63d6" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1537", "reference_id": "RHSA-2022:1537", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1537" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1592", "reference_id": "RHSA-2022:1592", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1592" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1665", "reference_id": "RHSA-2022:1665", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1665" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1676", "reference_id": "RHSA-2022:1676", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1676" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:2191", "reference_id": "RHSA-2022:2191", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:2191" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4582", "reference_id": "RHSA-2022:4582", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4582" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4896", "reference_id": "RHSA-2022:4896", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4896" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4940", "reference_id": "RHSA-2022:4940", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4940" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4991", "reference_id": "RHSA-2022:4991", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4991" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4992", "reference_id": "RHSA-2022:4992", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4992" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4993", "reference_id": "RHSA-2022:4993", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4993" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4994", "reference_id": "RHSA-2022:4994", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4994" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5052", "reference_id": "RHSA-2022:5052", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5052" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5439", "reference_id": "RHSA-2022:5439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5439" }, { "reference_url": "https://usn.ubuntu.com/5378-1/", "reference_id": "USN-5378-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5378-1/" }, { "reference_url": "https://usn.ubuntu.com/5378-2/", "reference_id": "USN-5378-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5378-2/" }, { "reference_url": "https://usn.ubuntu.com/5378-3/", "reference_id": "USN-5378-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5378-3/" }, { "reference_url": "https://usn.ubuntu.com/5378-4/", "reference_id": "USN-5378-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5378-4/" }, { "reference_url": "https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch", "reference_id": "xzgrep-ZDI-CAN-16587.patch", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T14:55:46Z/" } ], "url": "https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924713?format=api", "purl": "pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924711?format=api", "purl": "pkg:deb/debian/gzip@1.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924714?format=api", "purl": "pkg:deb/debian/gzip@1.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-1271" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3adf-qttu-3kfd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47647?format=api", "vulnerability_id": "VCID-73ee-qa4t-gqd7", "summary": "gzip is affected by multiple vulnerabilities, including buffer overflows\n and infinite loops, possibly allowing the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4334.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4334.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4334", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.09059", "scoring_system": "epss", "scoring_elements": "0.92644", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.10427", "scoring_system": "epss", "scoring_elements": "0.93205", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.10427", "scoring_system": "epss", "scoring_elements": "0.93209", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.10427", "scoring_system": "epss", "scoring_elements": "0.93206", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.10427", "scoring_system": "epss", "scoring_elements": "0.93196", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.10427", "scoring_system": "epss", "scoring_elements": "0.93219", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.10427", "scoring_system": "epss", "scoring_elements": "0.93223", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.10427", "scoring_system": "epss", "scoring_elements": "0.93215", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4334" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4334", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4334" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618181", "reference_id": "1618181", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618181" }, { "reference_url": "https://security.gentoo.org/glsa/200609-13", "reference_id": "GLSA-200609-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200609-13" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0667", "reference_id": "RHSA-2006:0667", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0667" }, { "reference_url": "https://usn.ubuntu.com/349-1/", "reference_id": "USN-349-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/349-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924718?format=api", "purl": "pkg:deb/debian/gzip@1.3.5-15?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-15%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924713?format=api", "purl": "pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924711?format=api", "purl": "pkg:deb/debian/gzip@1.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924714?format=api", "purl": "pkg:deb/debian/gzip@1.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2006-4334" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-73ee-qa4t-gqd7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47650?format=api", "vulnerability_id": "VCID-ensg-v8ut-4kh9", "summary": "gzip is affected by multiple vulnerabilities, including buffer overflows\n and infinite loops, possibly allowing the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4337.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4337.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4337", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02365", "scoring_system": "epss", "scoring_elements": "0.84868", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02365", "scoring_system": "epss", "scoring_elements": "0.84883", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02365", "scoring_system": "epss", "scoring_elements": "0.84901", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02365", "scoring_system": "epss", "scoring_elements": "0.84905", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02365", "scoring_system": "epss", "scoring_elements": "0.84928", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02365", "scoring_system": "epss", "scoring_elements": "0.84935", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02365", "scoring_system": "epss", "scoring_elements": "0.84951", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.10293", "scoring_system": "epss", "scoring_elements": "0.9317", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.10293", "scoring_system": "epss", "scoring_elements": "0.93172", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4337" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4337", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4337" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=220595", "reference_id": "220595", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=220595" }, { "reference_url": "https://security.gentoo.org/glsa/200609-13", "reference_id": "GLSA-200609-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200609-13" }, { "reference_url": "https://security.gentoo.org/glsa/200611-24", "reference_id": "GLSA-200611-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200611-24" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0667", "reference_id": "RHSA-2006:0667", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0667" }, { "reference_url": "https://usn.ubuntu.com/349-1/", "reference_id": "USN-349-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/349-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924718?format=api", "purl": "pkg:deb/debian/gzip@1.3.5-15?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-15%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924713?format=api", "purl": "pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924711?format=api", "purl": "pkg:deb/debian/gzip@1.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924714?format=api", "purl": "pkg:deb/debian/gzip@1.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2006-4337" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ensg-v8ut-4kh9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89134?format=api", "vulnerability_id": "VCID-ggpy-kzh6-dkbh", "summary": "security flaw", "references": [ { "reference_url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt" }, { "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305255", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=305255" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "reference_url": "http://marc.info/?l=bugtraq&m=111402732406477&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=111402732406477&w=2" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2005-357.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1228.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-1228.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-1228", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04585", "scoring_system": "epss", "scoring_elements": "0.89225", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04585", "scoring_system": "epss", "scoring_elements": "0.89177", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04585", "scoring_system": "epss", "scoring_elements": "0.89183", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04585", "scoring_system": "epss", "scoring_elements": "0.89198", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04585", "scoring_system": "epss", "scoring_elements": "0.892", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04585", "scoring_system": "epss", "scoring_elements": "0.89218", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04585", "scoring_system": "epss", "scoring_elements": "0.89223", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04585", "scoring_system": "epss", "scoring_elements": "0.89232", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04585", "scoring_system": "epss", "scoring_elements": "0.89229", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-1228" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1228", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1228" }, { "reference_url": "http://secunia.com/advisories/15047", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/15047" }, { "reference_url": "http://secunia.com/advisories/18100", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18100" }, { "reference_url": "http://secunia.com/advisories/21253", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/21253" }, { "reference_url": "http://secunia.com/advisories/22033", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/22033" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20199" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11057", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11057" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A170", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A170" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A382", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A382" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1" }, { "reference_url": "http://www.debian.org/security/2005/dsa-752", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-752" }, { "reference_url": "http://www.osvdb.org/15721", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.osvdb.org/15721" }, { "reference_url": "http://www.securityfocus.com/bid/19289", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/19289" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2006/3101", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617616", "reference_id": "1617616", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617616" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1228", "reference_id": "CVE-2005-1228", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:357", "reference_id": "RHSA-2005:357", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:357" }, { "reference_url": "https://usn.ubuntu.com/116-1/", "reference_id": "USN-116-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/116-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924717?format=api", "purl": "pkg:deb/debian/gzip@1.3.5-10?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-10%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924713?format=api", "purl": "pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924711?format=api", "purl": "pkg:deb/debian/gzip@1.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924714?format=api", "purl": "pkg:deb/debian/gzip@1.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2005-1228" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ggpy-kzh6-dkbh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91212?format=api", "vulnerability_id": "VCID-hn43-p68p-g3d7", "summary": "The (1) gzexe, (2) zdiff, and (3) znew scripts in the gzip package, as used by other packages such as ncompress, allows local users to overwrite files via a symlink attack on temporary files. NOTE: the znew vulnerability may overlap CVE-2003-0367.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0970", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26987", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27102", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27143", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27179", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.26971", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.2704", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27085", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27088", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27044", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0970", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0970" }, { "reference_url": "http://secunia.com/advisories/13131", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/13131" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17583" }, { "reference_url": "http://www.debian.org/security/2004/dsa-588", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2004/dsa-588" }, { "reference_url": "http://www.securityfocus.com/bid/11288", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/11288" }, { "reference_url": "http://www.trustix.org/errata/2004/0050", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2004/0050" }, { "reference_url": "http://www.zataz.net/adviso/ncompress-09052005.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zataz.net/adviso/ncompress-09052005.txt" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=257314", "reference_id": "257314", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=257314" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0970", "reference_id": "CVE-2004-0970", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0970" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924716?format=api", "purl": "pkg:deb/debian/gzip@1.3.5-8?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-8%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924713?format=api", "purl": "pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924711?format=api", "purl": "pkg:deb/debian/gzip@1.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924714?format=api", "purl": "pkg:deb/debian/gzip@1.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2004-0970" ], "risk_score": 0.9, "exploitability": "0.5", "weighted_severity": "1.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hn43-p68p-g3d7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/107706?format=api", "vulnerability_id": "VCID-ja6m-7d3c-k3cc", "summary": "gzip before 1.3 in Solaris 8, when called with the -f or -force flags, will change the permissions of files that are hard linked to the target files, which allows local users to view or modify these files.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1349", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21469", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21639", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21696", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.2145", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21527", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21585", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21597", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21559", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21502", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-1349" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924715?format=api", "purl": "pkg:deb/debian/gzip@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924713?format=api", "purl": "pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924711?format=api", "purl": "pkg:deb/debian/gzip@1.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924714?format=api", "purl": "pkg:deb/debian/gzip@1.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2004-1349" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ja6m-7d3c-k3cc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47651?format=api", "vulnerability_id": "VCID-px24-9c2r-73cn", "summary": "gzip is affected by multiple vulnerabilities, including buffer overflows\n and infinite loops, possibly allowing the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4338.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4338.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4338", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03744", "scoring_system": "epss", "scoring_elements": "0.87957", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03744", "scoring_system": "epss", "scoring_elements": "0.87968", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03744", "scoring_system": "epss", "scoring_elements": "0.87982", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03744", "scoring_system": "epss", "scoring_elements": "0.87986", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03744", "scoring_system": "epss", "scoring_elements": "0.88006", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03744", "scoring_system": "epss", "scoring_elements": "0.88013", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03744", "scoring_system": "epss", "scoring_elements": "0.88023", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04679", "scoring_system": "epss", "scoring_elements": "0.89339", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04679", "scoring_system": "epss", "scoring_elements": "0.89336", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4338" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4338", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4338" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618182", "reference_id": "1618182", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618182" }, { "reference_url": "https://security.gentoo.org/glsa/200609-13", "reference_id": "GLSA-200609-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200609-13" }, { "reference_url": "https://security.gentoo.org/glsa/200611-24", "reference_id": "GLSA-200611-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200611-24" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0667", "reference_id": "RHSA-2006:0667", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0667" }, { "reference_url": "https://usn.ubuntu.com/349-1/", "reference_id": "USN-349-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/349-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924718?format=api", "purl": "pkg:deb/debian/gzip@1.3.5-15?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-15%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924713?format=api", "purl": "pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924711?format=api", "purl": "pkg:deb/debian/gzip@1.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924714?format=api", "purl": "pkg:deb/debian/gzip@1.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2006-4338" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-px24-9c2r-73cn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89129?format=api", "vulnerability_id": "VCID-uf6e-fsw6-bbbv", "summary": "security flaw", "references": [ { "reference_url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt" }, { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060301-01.U.asc" }, { "reference_url": "http://bugs.gentoo.org/show_bug.cgi?id=90626", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.gentoo.org/show_bug.cgi?id=90626" }, { "reference_url": "http://docs.info.apple.com/article.html?artnum=306172", "reference_id": "", "reference_type": "", "scores": [], "url": "http://docs.info.apple.com/article.html?artnum=306172" }, { "reference_url": "http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2005-357.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0758.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0758.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-0758", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.35615", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.3539", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0015", "scoring_system": "epss", "scoring_elements": "0.3559", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40416", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40437", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40399", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.4038", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40354", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40405", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-0758" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0758", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0758" }, { "reference_url": "http://secunia.com/advisories/18100", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18100" }, { "reference_url": "http://secunia.com/advisories/19183", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19183" }, { "reference_url": "http://secunia.com/advisories/22033", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/22033" }, { "reference_url": "http://secunia.com/advisories/26235", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26235" }, { "reference_url": "http://securitytracker.com/id?1013928", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1013928" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20539", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/20539" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1081", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1081" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1107", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1107" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9797", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9797" }, { "reference_url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_158801__Updated_bzip2_packages_fix_security_issues.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.fedoralegacy.org/updates/FC2/2005-11-14-FLSA_2005_158801__Updated_bzip2_packages_fix_security_issues.html" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200505-05.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200505-05.xml" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:026", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:026" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:027", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:027" }, { "reference_url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.002.html" }, { "reference_url": "http://www.osvdb.org/16371", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.osvdb.org/16371" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-474.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-474.html" }, { "reference_url": "http://www.securityfocus.com/bid/13582", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/13582" }, { "reference_url": "http://www.securityfocus.com/bid/25159", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/25159" }, { "reference_url": "http://www.ubuntu.com/usn/usn-158-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-158-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/2732", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/2732" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617573", "reference_id": "1617573", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617573" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=321286", "reference_id": "321286", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=321286" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:gzip:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0758", "reference_id": "CVE-2005-0758", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0758" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:357", "reference_id": "RHSA-2005:357", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:357" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:474", "reference_id": "RHSA-2005:474", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:474" }, { "reference_url": "https://usn.ubuntu.com/158-1/", "reference_id": "USN-158-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/158-1/" }, { "reference_url": "https://usn.ubuntu.com/161-1/", "reference_id": "USN-161-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/161-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924717?format=api", "purl": "pkg:deb/debian/gzip@1.3.5-10?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-10%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924713?format=api", "purl": "pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924711?format=api", "purl": "pkg:deb/debian/gzip@1.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924714?format=api", "purl": "pkg:deb/debian/gzip@1.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2005-0758" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uf6e-fsw6-bbbv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89143?format=api", "vulnerability_id": "VCID-vj3y-4hqq-xybm", "summary": "security flaw", "references": [ { "reference_url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.58/SCOSA-2005.58.txt" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2006//Aug/msg00000.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2005-357.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2005-357.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0988.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0988.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-0988", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.301", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30198", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30228", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30277", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30095", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30155", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30191", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30193", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.3015", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-0988" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0988", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0988" }, { "reference_url": "http://secunia.com/advisories/18100", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18100" }, { "reference_url": "http://secunia.com/advisories/21253", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/21253" }, { "reference_url": "http://secunia.com/advisories/22033", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/22033" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.555852" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10242" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1169" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A765" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101816-1" }, { "reference_url": "http://www.debian.org/security/2005/dsa-752", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-752" }, { "reference_url": "http://www.osvdb.org/15487", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.osvdb.org/15487" }, { "reference_url": "http://www.securityfocus.com/archive/1/394965", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/394965" }, { "reference_url": "http://www.securityfocus.com/bid/12996", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/12996" }, { "reference_url": "http://www.securityfocus.com/bid/19289", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/19289" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA06-214A.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2006/3101", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2006/3101" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617595", "reference_id": "1617595", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617595" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.2.4a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gzip:1.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.0:releng:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.0:releng:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.0:releng:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.10:release:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.10:release:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.10:release:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.10:release_p8:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.10:release_p8:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.10:release_p8:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.10:releng:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.10:releng:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.10:releng:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.1.1:release:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.1.1:release:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.1.1:release:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.11:release_p3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.11:release_p3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.11:release_p3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.11:releng:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.11:releng:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.11:releng:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.1.1:stable:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.11:stable:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.11:stable:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.11:stable:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.2:stable:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.2:stable:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.2:stable:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:release:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.3:release:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:release:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:release_p38:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.3:release_p38:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:release_p38:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:releng:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.3:releng:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:releng:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:stable:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.3:stable:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.3:stable:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.4:stable:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:release:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.5:stable:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:release:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:stable:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.6:stable:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.6:stable:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:release:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.7:release:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:release:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:stable:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.7:stable:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.7:stable:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.8:pre-release:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.8:pre-release:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.8:pre-release:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.8:release_p6:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.8:release_p6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.8:release_p6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.9:pre-release:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.9:pre-release:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.9:pre-release:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.9:releng:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:4.9:releng:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:4.9:releng:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:alpha:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:5.1:alpha:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:alpha:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:release:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.2.1:release:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.2.1:releng:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:5.2.1:releng:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.2.1:releng:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_hosting:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_appliance_server:1.0_workgroup:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:amd64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:i386:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:5.04:*:powerpc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0988", "reference_id": "CVE-2005-0988", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0988" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:357", "reference_id": "RHSA-2005:357", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:357" }, { "reference_url": "https://usn.ubuntu.com/116-1/", "reference_id": "USN-116-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/116-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924717?format=api", "purl": "pkg:deb/debian/gzip@1.3.5-10?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-10%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924713?format=api", "purl": "pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924711?format=api", "purl": "pkg:deb/debian/gzip@1.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924714?format=api", "purl": "pkg:deb/debian/gzip@1.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2005-0988" ], "risk_score": 1.6, "exploitability": "0.5", "weighted_severity": "3.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vj3y-4hqq-xybm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57806?format=api", "vulnerability_id": "VCID-vm8g-v83d-mbfm", "summary": "This GLSA contains notification of vulnerabilities found in several\n Gentoo packages which have been fixed prior to January 1, 2011. The worst\n of these vulnerabilities could lead to local privilege escalation and\n remote code execution. Please see the package list and CVE identifiers\n below for more information.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0001.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0001.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0001", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.22601", "scoring_system": "epss", "scoring_elements": "0.95813", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.22601", "scoring_system": "epss", "scoring_elements": "0.95822", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.22601", "scoring_system": "epss", "scoring_elements": "0.9583", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.22601", "scoring_system": "epss", "scoring_elements": "0.95832", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.22601", "scoring_system": "epss", "scoring_elements": "0.95841", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.22601", "scoring_system": "epss", "scoring_elements": "0.95845", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.22601", "scoring_system": "epss", "scoring_elements": "0.95848", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.22601", "scoring_system": "epss", "scoring_elements": "0.95849", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0001" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=554418", "reference_id": "554418", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554418" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=566002", "reference_id": "566002", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=566002" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0061", "reference_id": "RHSA-2010:0061", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0061" }, { "reference_url": "https://usn.ubuntu.com/889-1/", "reference_id": "USN-889-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/889-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924720?format=api", "purl": "pkg:deb/debian/gzip@1.3.12-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.12-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924713?format=api", "purl": "pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924711?format=api", "purl": "pkg:deb/debian/gzip@1.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924714?format=api", "purl": "pkg:deb/debian/gzip@1.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2010-0001" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vm8g-v83d-mbfm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89663?format=api", "vulnerability_id": "VCID-w9ut-ky8t-sqar", "summary": "gzip: symlink attack on temporary files leads to arbitrary file overwrite", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0367.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0367.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0367", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.33986", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34325", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34353", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34261", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34291", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.3425", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34227", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0367" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0367", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0367" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1850889", "reference_id": "1850889", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1850889" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924712?format=api", "purl": "pkg:deb/debian/gzip@1.3.5-6?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-6%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924713?format=api", "purl": "pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924711?format=api", "purl": "pkg:deb/debian/gzip@1.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924714?format=api", "purl": "pkg:deb/debian/gzip@1.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2003-0367" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w9ut-ky8t-sqar" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36507?format=api", "vulnerability_id": "VCID-xpf8-3pr7-dyew", "summary": "gzip contain a bug potentially allowing an attacker to execute arbitrary\n commands.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0603.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0603.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0603", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02503", "scoring_system": "epss", "scoring_elements": "0.85278", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02503", "scoring_system": "epss", "scoring_elements": "0.8529", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02503", "scoring_system": "epss", "scoring_elements": "0.85309", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02503", "scoring_system": "epss", "scoring_elements": "0.85311", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02503", "scoring_system": "epss", "scoring_elements": "0.85333", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02503", "scoring_system": "epss", "scoring_elements": "0.85341", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02503", "scoring_system": "epss", "scoring_elements": "0.85355", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02503", "scoring_system": "epss", "scoring_elements": "0.85353", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02503", "scoring_system": "epss", "scoring_elements": "0.8535", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0603" }, { "reference_url": "https://security.gentoo.org/glsa/200406-18", "reference_id": "GLSA-200406-18", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200406-18" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924715?format=api", "purl": "pkg:deb/debian/gzip@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924713?format=api", "purl": "pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924711?format=api", "purl": "pkg:deb/debian/gzip@1.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924714?format=api", "purl": "pkg:deb/debian/gzip@1.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2004-0603" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xpf8-3pr7-dyew" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47649?format=api", "vulnerability_id": "VCID-z31n-qyzz-rfhy", "summary": "gzip is affected by multiple vulnerabilities, including buffer overflows\n and infinite loops, possibly allowing the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4336.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4336.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4336", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02573", "scoring_system": "epss", "scoring_elements": "0.85478", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02573", "scoring_system": "epss", "scoring_elements": "0.8549", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02573", "scoring_system": "epss", "scoring_elements": "0.85507", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02573", "scoring_system": "epss", "scoring_elements": "0.85511", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02573", "scoring_system": "epss", "scoring_elements": "0.85531", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02573", "scoring_system": "epss", "scoring_elements": "0.8554", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02573", "scoring_system": "epss", "scoring_elements": "0.85554", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.13836", "scoring_system": "epss", "scoring_elements": "0.94291", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.13836", "scoring_system": "epss", "scoring_elements": "0.94292", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4336" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4336", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4336" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=220595", "reference_id": "220595", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=220595" }, { "reference_url": "https://security.gentoo.org/glsa/200609-13", "reference_id": "GLSA-200609-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200609-13" }, { "reference_url": "https://security.gentoo.org/glsa/200611-24", "reference_id": "GLSA-200611-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200611-24" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0667", "reference_id": "RHSA-2006:0667", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0667" }, { "reference_url": "https://usn.ubuntu.com/349-1/", "reference_id": "USN-349-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/349-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924718?format=api", "purl": "pkg:deb/debian/gzip@1.3.5-15?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-15%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924713?format=api", "purl": "pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924711?format=api", "purl": "pkg:deb/debian/gzip@1.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924714?format=api", "purl": "pkg:deb/debian/gzip@1.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2006-4336" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z31n-qyzz-rfhy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47648?format=api", "vulnerability_id": "VCID-z6cd-db4j-2uey", "summary": "gzip is affected by multiple vulnerabilities, including buffer overflows\n and infinite loops, possibly allowing the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4335.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-4335.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4335", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.009", "scoring_system": "epss", "scoring_elements": "0.7561", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.009", "scoring_system": "epss", "scoring_elements": "0.75612", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.009", "scoring_system": "epss", "scoring_elements": "0.75643", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.009", "scoring_system": "epss", "scoring_elements": "0.75622", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.009", "scoring_system": "epss", "scoring_elements": "0.75656", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.009", "scoring_system": "epss", "scoring_elements": "0.75668", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.009", "scoring_system": "epss", "scoring_elements": "0.75692", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03561", "scoring_system": "epss", "scoring_elements": "0.87708", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03561", "scoring_system": "epss", "scoring_elements": "0.87706", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4335" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4335", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4335" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=220595", "reference_id": "220595", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=220595" }, { "reference_url": "https://security.gentoo.org/glsa/200609-13", "reference_id": "GLSA-200609-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200609-13" }, { "reference_url": "https://security.gentoo.org/glsa/200611-24", "reference_id": "GLSA-200611-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200611-24" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2006:0667", "reference_id": "RHSA-2006:0667", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2006:0667" }, { "reference_url": "https://usn.ubuntu.com/349-1/", "reference_id": "USN-349-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/349-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/924718?format=api", "purl": "pkg:deb/debian/gzip@1.3.5-15?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.3.5-15%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924713?format=api", "purl": "pkg:deb/debian/gzip@1.10-4%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.10-4%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924711?format=api", "purl": "pkg:deb/debian/gzip@1.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/924714?format=api", "purl": "pkg:deb/debian/gzip@1.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2006-4335" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z6cd-db4j-2uey" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gzip@1.13-1%3Fdistro=trixie" }