Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/iputils@3:20221126-1%2Bdeb12u1?distro=trixie
Typedeb
Namespacedebian
Nameiputils
Version3:20221126-1+deb12u1
Qualifiers
distro trixie
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version3:20250605-1
Latest_non_vulnerable_version3:20250605-1
Affected_by_vulnerabilities
0
url VCID-tjcx-ywqj-ykd9
vulnerability_id VCID-tjcx-ywqj-ykd9
summary iputils: Signed Integer Overflow in Timestamp Multiplication in iputils ping
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47268.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-47268.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-47268
reference_id
reference_type
scores
0
value 0.00508
scoring_system epss
scoring_elements 0.66505
published_at 2026-05-14T12:55:00Z
1
value 0.00508
scoring_system epss
scoring_elements 0.66276
published_at 2026-04-07T12:55:00Z
2
value 0.00508
scoring_system epss
scoring_elements 0.66323
published_at 2026-04-08T12:55:00Z
3
value 0.00508
scoring_system epss
scoring_elements 0.66337
published_at 2026-04-09T12:55:00Z
4
value 0.00508
scoring_system epss
scoring_elements 0.66357
published_at 2026-04-11T12:55:00Z
5
value 0.00508
scoring_system epss
scoring_elements 0.66344
published_at 2026-04-12T12:55:00Z
6
value 0.00508
scoring_system epss
scoring_elements 0.66313
published_at 2026-04-13T12:55:00Z
7
value 0.00508
scoring_system epss
scoring_elements 0.66348
published_at 2026-04-21T12:55:00Z
8
value 0.00508
scoring_system epss
scoring_elements 0.66363
published_at 2026-04-18T12:55:00Z
9
value 0.00508
scoring_system epss
scoring_elements 0.66371
published_at 2026-04-24T12:55:00Z
10
value 0.00508
scoring_system epss
scoring_elements 0.66386
published_at 2026-04-29T12:55:00Z
11
value 0.00508
scoring_system epss
scoring_elements 0.66361
published_at 2026-05-05T12:55:00Z
12
value 0.00508
scoring_system epss
scoring_elements 0.66406
published_at 2026-05-07T12:55:00Z
13
value 0.00508
scoring_system epss
scoring_elements 0.6645
published_at 2026-05-09T12:55:00Z
14
value 0.00508
scoring_system epss
scoring_elements 0.66423
published_at 2026-05-11T12:55:00Z
15
value 0.00508
scoring_system epss
scoring_elements 0.66444
published_at 2026-05-12T12:55:00Z
16
value 0.00908
scoring_system epss
scoring_elements 0.75745
published_at 2026-04-04T12:55:00Z
17
value 0.00908
scoring_system epss
scoring_elements 0.75714
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-47268
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47268
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47268
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/iputils/iputils/commit/070cfacd7348386173231fb16fad4983d4e6ae40
reference_id 070cfacd7348386173231fb16fad4983d4e6ae40
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-05T13:24:34Z/
url https://github.com/iputils/iputils/commit/070cfacd7348386173231fb16fad4983d4e6ae40
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1104746
reference_id 1104746
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1104746
6
reference_url https://github.com/iputils/iputils/releases/tag/20250602
reference_id 20250602
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-05T13:24:34Z/
url https://github.com/iputils/iputils/releases/tag/20250602
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2364090
reference_id 2364090
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2364090
8
reference_url https://github.com/iputils/iputils/issues/584
reference_id 584
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-05T13:24:34Z/
url https://github.com/iputils/iputils/issues/584
9
reference_url https://github.com/iputils/iputils/pull/585
reference_id 585
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-05T13:24:34Z/
url https://github.com/iputils/iputils/pull/585
10
reference_url https://github.com/Zephkek/ping-rtt-overflow/
reference_id ping-rtt-overflow
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-05T13:24:34Z/
url https://github.com/Zephkek/ping-rtt-overflow/
11
reference_url https://access.redhat.com/errata/RHSA-2025:11320
reference_id RHSA-2025:11320
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:11320
12
reference_url https://access.redhat.com/errata/RHSA-2025:11321
reference_id RHSA-2025:11321
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:11321
13
reference_url https://access.redhat.com/errata/RHSA-2025:9421
reference_id RHSA-2025:9421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:9421
14
reference_url https://access.redhat.com/errata/RHSA-2025:9432
reference_id RHSA-2025:9432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:9432
15
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1242300
reference_id show_bug.cgi?id=1242300
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-05T13:24:34Z/
url https://bugzilla.suse.com/show_bug.cgi?id=1242300
16
reference_url https://usn.ubuntu.com/7670-1/
reference_id USN-7670-1
reference_type
scores
url https://usn.ubuntu.com/7670-1/
fixed_packages
0
url pkg:deb/debian/iputils@3:20250605-1?distro=trixie
purl pkg:deb/debian/iputils@3:20250605-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/iputils@3:20250605-1%3Fdistro=trixie
aliases CVE-2025-47268
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tjcx-ywqj-ykd9
Fixing_vulnerabilities
0
url VCID-nes3-sr2e-yueb
vulnerability_id VCID-nes3-sr2e-yueb
summary
This GLSA contains notification of vulnerabilities found in several
    Gentoo packages which have been fixed prior to January 1, 2011. The worst
    of these vulnerabilities could lead to local privilege escalation and
    remote code execution. Please see the package list and CVE identifiers
    below for more information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2529.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2529.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-2529
reference_id
reference_type
scores
0
value 0.00711
scoring_system epss
scoring_elements 0.72284
published_at 2026-04-11T12:55:00Z
1
value 0.00711
scoring_system epss
scoring_elements 0.72211
published_at 2026-04-01T12:55:00Z
2
value 0.00711
scoring_system epss
scoring_elements 0.72217
published_at 2026-04-02T12:55:00Z
3
value 0.00711
scoring_system epss
scoring_elements 0.72237
published_at 2026-04-04T12:55:00Z
4
value 0.00711
scoring_system epss
scoring_elements 0.72213
published_at 2026-04-07T12:55:00Z
5
value 0.00711
scoring_system epss
scoring_elements 0.7225
published_at 2026-04-08T12:55:00Z
6
value 0.00711
scoring_system epss
scoring_elements 0.72262
published_at 2026-04-09T12:55:00Z
7
value 0.00716
scoring_system epss
scoring_elements 0.72454
published_at 2026-04-26T12:55:00Z
8
value 0.00716
scoring_system epss
scoring_elements 0.7245
published_at 2026-04-29T12:55:00Z
9
value 0.00716
scoring_system epss
scoring_elements 0.72442
published_at 2026-05-05T12:55:00Z
10
value 0.00716
scoring_system epss
scoring_elements 0.72471
published_at 2026-05-07T12:55:00Z
11
value 0.00716
scoring_system epss
scoring_elements 0.72497
published_at 2026-05-09T12:55:00Z
12
value 0.00716
scoring_system epss
scoring_elements 0.72459
published_at 2026-05-11T12:55:00Z
13
value 0.00716
scoring_system epss
scoring_elements 0.72486
published_at 2026-05-12T12:55:00Z
14
value 0.00716
scoring_system epss
scoring_elements 0.72542
published_at 2026-05-14T12:55:00Z
15
value 0.00716
scoring_system epss
scoring_elements 0.72376
published_at 2026-04-12T12:55:00Z
16
value 0.00716
scoring_system epss
scoring_elements 0.72364
published_at 2026-04-13T12:55:00Z
17
value 0.00716
scoring_system epss
scoring_elements 0.72405
published_at 2026-04-16T12:55:00Z
18
value 0.00716
scoring_system epss
scoring_elements 0.72414
published_at 2026-04-18T12:55:00Z
19
value 0.00716
scoring_system epss
scoring_elements 0.72402
published_at 2026-04-21T12:55:00Z
20
value 0.00716
scoring_system epss
scoring_elements 0.72445
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-2529
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2529
3
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2010:138
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2010:138
4
reference_url http://www.securityfocus.com/bid/41911
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/41911
5
reference_url http://www.vupen.com/english/advisories/2010/1890
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/1890
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=613819
reference_id 613819
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=613819
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:skbuff:iputils:20020927:*:*:*:*:*:*:*
reference_id cpe:2.3:a:skbuff:iputils:20020927:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:skbuff:iputils:20020927:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:skbuff:iputils:20070202:*:*:*:*:*:*:*
reference_id cpe:2.3:a:skbuff:iputils:20070202:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:skbuff:iputils:20070202:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:skbuff:iputils:20071127:*:*:*:*:*:*:*
reference_id cpe:2.3:a:skbuff:iputils:20071127:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:skbuff:iputils:20071127:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:skbuff:iputils:20100214:*:*:*:*:*:*:*
reference_id cpe:2.3:a:skbuff:iputils:20100214:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:skbuff:iputils:20100214:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandriva:linux:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mandriva:linux:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandriva:linux:*:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2010-2529
reference_id CVE-2010-2529
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2010-2529
13
reference_url https://security.gentoo.org/glsa/201412-08
reference_id GLSA-201412-08
reference_type
scores
url https://security.gentoo.org/glsa/201412-08
fixed_packages
0
url pkg:deb/debian/iputils@3:20100418-2?distro=trixie
purl pkg:deb/debian/iputils@3:20100418-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/iputils@3:20100418-2%3Fdistro=trixie
1
url pkg:deb/debian/iputils@3:20210202-1?distro=trixie
purl pkg:deb/debian/iputils@3:20210202-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tjcx-ywqj-ykd9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/iputils@3:20210202-1%3Fdistro=trixie
2
url pkg:deb/debian/iputils@3:20221126-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/iputils@3:20221126-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tjcx-ywqj-ykd9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/iputils@3:20221126-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/iputils@3:20240905-3?distro=trixie
purl pkg:deb/debian/iputils@3:20240905-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tjcx-ywqj-ykd9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/iputils@3:20240905-3%3Fdistro=trixie
4
url pkg:deb/debian/iputils@3:20250605-1?distro=trixie
purl pkg:deb/debian/iputils@3:20250605-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/iputils@3:20250605-1%3Fdistro=trixie
aliases CVE-2010-2529
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nes3-sr2e-yueb
1
url VCID-zvun-dwgh-eqh5
vulnerability_id VCID-zvun-dwgh-eqh5
summary iputils: iputils integer overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-48964.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-48964.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-48964
reference_id
reference_type
scores
0
value 0.00138
scoring_system epss
scoring_elements 0.33391
published_at 2026-05-07T12:55:00Z
1
value 0.00138
scoring_system epss
scoring_elements 0.33324
published_at 2026-05-05T12:55:00Z
2
value 0.00138
scoring_system epss
scoring_elements 0.3344
published_at 2026-04-29T12:55:00Z
3
value 0.00138
scoring_system epss
scoring_elements 0.33525
published_at 2026-04-26T12:55:00Z
4
value 0.00138
scoring_system epss
scoring_elements 0.33545
published_at 2026-04-24T12:55:00Z
5
value 0.00138
scoring_system epss
scoring_elements 0.33951
published_at 2026-04-18T12:55:00Z
6
value 0.00138
scoring_system epss
scoring_elements 0.33919
published_at 2026-04-21T12:55:00Z
7
value 0.0014
scoring_system epss
scoring_elements 0.3362
published_at 2026-05-14T12:55:00Z
8
value 0.0014
scoring_system epss
scoring_elements 0.3361
published_at 2026-05-09T12:55:00Z
9
value 0.0014
scoring_system epss
scoring_elements 0.33521
published_at 2026-05-11T12:55:00Z
10
value 0.0014
scoring_system epss
scoring_elements 0.33544
published_at 2026-05-12T12:55:00Z
11
value 0.00155
scoring_system epss
scoring_elements 0.36369
published_at 2026-04-04T12:55:00Z
12
value 0.00155
scoring_system epss
scoring_elements 0.36336
published_at 2026-04-02T12:55:00Z
13
value 0.00165
scoring_system epss
scoring_elements 0.3752
published_at 2026-04-08T12:55:00Z
14
value 0.00165
scoring_system epss
scoring_elements 0.37533
published_at 2026-04-16T12:55:00Z
15
value 0.00165
scoring_system epss
scoring_elements 0.37547
published_at 2026-04-11T12:55:00Z
16
value 0.00165
scoring_system epss
scoring_elements 0.37512
published_at 2026-04-12T12:55:00Z
17
value 0.00165
scoring_system epss
scoring_elements 0.37485
published_at 2026-04-13T12:55:00Z
18
value 0.00165
scoring_system epss
scoring_elements 0.37469
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-48964
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/iputils/iputils/releases/tag/20250602
reference_id 20250602
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-22T18:00:42Z/
url https://github.com/iputils/iputils/releases/tag/20250602
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2382657
reference_id 2382657
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2382657
5
reference_url https://github.com/iputils/iputils/commit/afa36390394a6e0cceba03b52b59b6d41710608c
reference_id afa36390394a6e0cceba03b52b59b6d41710608c
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-22T18:00:42Z/
url https://github.com/iputils/iputils/commit/afa36390394a6e0cceba03b52b59b6d41710608c
6
reference_url https://github.com/iputils/iputils/security/advisories/GHSA-25fr-jw29-74f9
reference_id GHSA-25fr-jw29-74f9
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-22T18:00:42Z/
url https://github.com/iputils/iputils/security/advisories/GHSA-25fr-jw29-74f9
7
reference_url https://github.com/iputils/iputils/issues
reference_id issues
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-22T18:00:42Z/
url https://github.com/iputils/iputils/issues
8
reference_url https://access.redhat.com/errata/RHSA-2025:17558
reference_id RHSA-2025:17558
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17558
9
reference_url https://access.redhat.com/errata/RHSA-2025:17559
reference_id RHSA-2025:17559
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17559
10
reference_url https://access.redhat.com/errata/RHSA-2025:17560
reference_id RHSA-2025:17560
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17560
11
reference_url https://bugzilla.suse.com/show_bug.cgi?id=1243772
reference_id show_bug.cgi?id=1243772
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-22T18:00:42Z/
url https://bugzilla.suse.com/show_bug.cgi?id=1243772
12
reference_url https://usn.ubuntu.com/7670-1/
reference_id USN-7670-1
reference_type
scores
url https://usn.ubuntu.com/7670-1/
fixed_packages
0
url pkg:deb/debian/iputils@0?distro=trixie
purl pkg:deb/debian/iputils@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/iputils@0%3Fdistro=trixie
1
url pkg:deb/debian/iputils@3:20210202-1?distro=trixie
purl pkg:deb/debian/iputils@3:20210202-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tjcx-ywqj-ykd9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/iputils@3:20210202-1%3Fdistro=trixie
2
url pkg:deb/debian/iputils@3:20221126-1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/iputils@3:20221126-1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tjcx-ywqj-ykd9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/iputils@3:20221126-1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/iputils@3:20240905-3?distro=trixie
purl pkg:deb/debian/iputils@3:20240905-3?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-tjcx-ywqj-ykd9
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/iputils@3:20240905-3%3Fdistro=trixie
4
url pkg:deb/debian/iputils@3:20250605-1?distro=trixie
purl pkg:deb/debian/iputils@3:20250605-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/iputils@3:20250605-1%3Fdistro=trixie
aliases CVE-2025-48964
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zvun-dwgh-eqh5
Risk_score3.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/iputils@3:20221126-1%252Bdeb12u1%3Fdistro=trixie