Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-5ss1-zqsc-tbbm
Summary
A bug in the aspell utility word-list-compress can allow an attacker to
    execute arbitrary code.
Aliases
0
alias CVE-2004-0548
Fixed_packages
0
url pkg:deb/debian/aspell@0.50.5-3?distro=trixie
purl pkg:deb/debian/aspell@0.50.5-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aspell@0.50.5-3%3Fdistro=trixie
1
url pkg:deb/debian/aspell@0.60.2%2B20050121-2
purl pkg:deb/debian/aspell@0.60.2%2B20050121-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-rtxt-2zns-byan
1
vulnerability VCID-rxk9-kxe4-ykau
2
vulnerability VCID-vruj-xakg-fqax
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aspell@0.60.2%252B20050121-2
2
url pkg:deb/debian/aspell@0.60.8-3?distro=trixie
purl pkg:deb/debian/aspell@0.60.8-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aspell@0.60.8-3%3Fdistro=trixie
3
url pkg:deb/debian/aspell@0.60.8-4?distro=trixie
purl pkg:deb/debian/aspell@0.60.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aspell@0.60.8-4%3Fdistro=trixie
4
url pkg:deb/debian/aspell@0.60.8.1-4?distro=trixie
purl pkg:deb/debian/aspell@0.60.8.1-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aspell@0.60.8.1-4%3Fdistro=trixie
5
url pkg:deb/debian/aspell@0.60.8.2-3?distro=trixie
purl pkg:deb/debian/aspell@0.60.8.2-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aspell@0.60.8.2-3%3Fdistro=trixie
6
url pkg:ebuild/app-text/aspell@0.50.5-r4
purl pkg:ebuild/app-text/aspell@0.50.5-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/aspell@0.50.5-r4
Affected_packages
0
url pkg:deb/debian/aspell@0.29.1-1
purl pkg:deb/debian/aspell@0.29.1-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5ss1-zqsc-tbbm
1
vulnerability VCID-rtxt-2zns-byan
2
vulnerability VCID-rxk9-kxe4-ykau
3
vulnerability VCID-vruj-xakg-fqax
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aspell@0.29.1-1
1
url pkg:deb/debian/aspell@0.33.7.1.1-9
purl pkg:deb/debian/aspell@0.33.7.1.1-9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5ss1-zqsc-tbbm
1
vulnerability VCID-rtxt-2zns-byan
2
vulnerability VCID-rxk9-kxe4-ykau
3
vulnerability VCID-vruj-xakg-fqax
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/aspell@0.33.7.1.1-9
2
url pkg:ebuild/app-text/aspell@0.50.5-r3
purl pkg:ebuild/app-text/aspell@0.50.5-r3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5ss1-zqsc-tbbm
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/app-text/aspell@0.50.5-r3
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0548
reference_id
reference_type
scores
0
value 0.00184
scoring_system epss
scoring_elements 0.40038
published_at 2026-04-01T12:55:00Z
1
value 0.00184
scoring_system epss
scoring_elements 0.40187
published_at 2026-04-02T12:55:00Z
2
value 0.00184
scoring_system epss
scoring_elements 0.40211
published_at 2026-04-11T12:55:00Z
3
value 0.00184
scoring_system epss
scoring_elements 0.40135
published_at 2026-04-07T12:55:00Z
4
value 0.00184
scoring_system epss
scoring_elements 0.40188
published_at 2026-04-08T12:55:00Z
5
value 0.00184
scoring_system epss
scoring_elements 0.40199
published_at 2026-04-09T12:55:00Z
6
value 0.00184
scoring_system epss
scoring_elements 0.40174
published_at 2026-04-12T12:55:00Z
7
value 0.00184
scoring_system epss
scoring_elements 0.40155
published_at 2026-04-13T12:55:00Z
8
value 0.00184
scoring_system epss
scoring_elements 0.40205
published_at 2026-04-16T12:55:00Z
9
value 0.00184
scoring_system epss
scoring_elements 0.40175
published_at 2026-04-18T12:55:00Z
10
value 0.00184
scoring_system epss
scoring_elements 0.40096
published_at 2026-04-21T12:55:00Z
11
value 0.00184
scoring_system epss
scoring_elements 0.39921
published_at 2026-04-24T12:55:00Z
12
value 0.00184
scoring_system epss
scoring_elements 0.39906
published_at 2026-04-26T12:55:00Z
13
value 0.00184
scoring_system epss
scoring_elements 0.39825
published_at 2026-04-29T12:55:00Z
14
value 0.00184
scoring_system epss
scoring_elements 0.39696
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0548
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0548
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0548
2
reference_url https://security.gentoo.org/glsa/200406-14
reference_id GLSA-200406-14
reference_type
scores
url https://security.gentoo.org/glsa/200406-14
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/669.c
reference_id OSVDB-7125;CVE-2004-0548
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/669.c
Weaknesses
Exploits
0
date_added 2004-11-30
description Aspell (word-list-compress) - Command Line Stack Overflow
required_action null
due_date null
notes null
known_ransomware_campaign_use true
source_date_published 2004-12-01
exploit_type local
platform linux
source_date_updated 2016-04-19
data_source Exploit-DB
source_url
Severity_range_scorenull
Exploitability2.0
Weighted_severity0.0
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-5ss1-zqsc-tbbm