[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2006-5864":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-08T08:11:26.341Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":68,"aliases":93,"duplicate_of":9,"upstream":94,"downstream":95,"duplicates":108,"related":109,"reserved_at":9,"published_at":111,"modified_at":112,"state":113,"summary":114,"references_raw":122,"kevs":297,"epss":298,"epss_history":301,"metrics":541,"affected":546},"CVE-2006-5864","Stack-based buffer overflow in the ps_gettext function in ps.c for GNU gv 3.6.2, and possibly earlier versions, allows user-assisted attackers to execute arbitrary code via a PostScript (PS) file with certain headers that contain long comments, as demonstrated using the (1) DocumentMedia, (2) DocumentPaperSizes, and possibly (3) PageMedia and (4) PaperSize headers.  NOTE: this issue can be exploited through other products that use gv such as evince.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-119","Improper Restriction of Operations within the Bounds of a Memory Buffer","The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.","weakness","Stable","Class","High",[20,24,28,32,36,40,44,48,52,56,60,64],{"id":21,"name":22,"techniques":23},"CAPEC-10","Buffer Overflow via Environment Variables",[],{"id":25,"name":26,"techniques":27},"CAPEC-100","Overflow Buffers",[],{"id":29,"name":30,"techniques":31},"CAPEC-123","Buffer Manipulation",[],{"id":33,"name":34,"techniques":35},"CAPEC-14","Client-side Injection-induced Buffer Overflow",[],{"id":37,"name":38,"techniques":39},"CAPEC-24","Filter Failure through Buffer Overflow",[],{"id":41,"name":42,"techniques":43},"CAPEC-42","MIME Conversion",[],{"id":45,"name":46,"techniques":47},"CAPEC-44","Overflow Binary Resource File",[],{"id":49,"name":50,"techniques":51},"CAPEC-45","Buffer Overflow via Symbolic Links",[],{"id":53,"name":54,"techniques":55},"CAPEC-46","Overflow Variables and Tags",[],{"id":57,"name":58,"techniques":59},"CAPEC-47","Buffer Overflow via Parameter Expansion",[],{"id":61,"name":62,"techniques":63},"CAPEC-8","Buffer Overflow in an API Call",[],{"id":65,"name":66,"techniques":67},"CAPEC-9","Buffer Overflow in Local Command-Line Utilities",[],[69,78],{"_key":70,"name":71,"source":72,"url":73,"maturity":74,"reliability_score":75,"verified":76,"type":9,"platforms":77,"requires_auth":9,"exploitdb":9,"metasploit":9},"REF_1B7B276DCB14165B","Exploit Reference (securityfocus.com)","reference","http://www.securityfocus.com/bid/20978","unknown",0.2,false,[],{"_key":79,"name":80,"source":81,"url":82,"maturity":83,"reliability_score":84,"verified":85,"type":86,"platforms":87,"requires_auth":9,"exploitdb":89,"metasploit":9},"2858","Evince Document Viewer - 'DocumentMedia' Remote Buffer Overflow","exploit-database","https://www.exploit-db.com/exploits/2858","weaponized",0.8,true,"remote",[88],"linux",{"verified":85,"type":86,"platform":88,"file":90,"codes":91},"exploits/linux/remote/2858.c",[92,7],"OSVDB-30274",[],[],[96,98,100,102,104,106],{"_key":97},"DEBIAN-CVE-2006-5864",{"_key":99},"DSA-1214",{"_key":101},"OPENSUSE-SU-2024:10742-1",{"_key":103},"DSA-1214-1",{"_key":105},"DSA-1214-2",{"_key":107},"DSA-1243-1",[],[110],{"_key":101},"2006-11-11T01:00:00.000Z","2024-08-07T20:04:55.621Z","Deferred",{"cisa_kev":76,"cisa_ransomware":76,"cisa_vendor":9,"epss_severity":115,"epss_score":116,"severity":117,"severity_score":118,"severity_version":119,"severity_source":120,"severity_vector":121,"severity_status":113},"high",0.30732,"medium",5.1,"v2.0","nvd","AV:N/AC:H/Au:N/C:P/I:P/A:P",[123,130,136,142,147,151,156,160,164,168,172,176,181,185,189,194,198,203,207,211,217,223,227,231,235,239,243,247,252,256,260,265,269,273,277,281,285,289,293],{"url":124,"sources":125,"tags":127},"https://exchange.xforce.ibmcloud.com/vulnerabilities/30153",[126,120],"cve.org",[128,129],"VDB Entry","X Refsource XF",{"url":131,"sources":132,"tags":133},"http://www.debian.org/security/2006/dsa-1214",[126,120],[134,135],"Vendor Advisory","X Refsource DEBIAN",{"url":137,"sources":138,"tags":139},"http://secunia.com/advisories/23018",[126,120],[140,141,134],"Third Party Advisory","X Refsource SECUNIA",{"url":143,"sources":144,"tags":145},"http://www.vupen.com/english/advisories/2006/4424",[126,120],[128,146,134],"X Refsource VUPEN",{"url":148,"sources":149,"tags":150},"http://secunia.com/advisories/22932",[126,120],[140,141,134],{"url":82,"sources":152,"tags":153},[126,120],[154,155],"Exploit","X Refsource EXPLOIT DB",{"url":157,"sources":158,"tags":159},"http://secunia.com/advisories/23353",[126,120],[140,141,134],{"url":161,"sources":162,"tags":163},"http://secunia.com/advisories/23306",[126,120],[140,141,134],{"url":165,"sources":166,"tags":167},"http://secunia.com/advisories/23266",[126,120],[140,141,134],{"url":169,"sources":170,"tags":171},"http://secunia.com/advisories/23579",[126,120],[140,141,134],{"url":173,"sources":174,"tags":175},"http://secunia.com/advisories/24787",[126,120],[140,141,134],{"url":177,"sources":178,"tags":179},"http://www.novell.com/linux/security/advisories/2006_26_sr.html",[126,120],[134,180],"X Refsource SUSE",{"url":182,"sources":183,"tags":184},"http://www.novell.com/linux/security/advisories/2006_28_sr.html",[126,120],[134,180],{"url":186,"sources":187,"tags":188},"http://secunia.com/advisories/23409",[126,120],[140,141,134],{"url":190,"sources":191,"tags":192},"http://security.gentoo.org/glsa/glsa-200704-06.xml",[126,120],[134,193],"X Refsource GENTOO",{"url":195,"sources":196,"tags":197},"http://security.gentoo.org/glsa/glsa-200703-24.xml",[126,120],[134,193],{"url":199,"sources":200,"tags":201},"http://www.ubuntu.com/usn/usn-390-2",[126,120],[134,202],"X Refsource UBUNTU",{"url":204,"sources":205,"tags":206},"http://secunia.com/advisories/23335",[126,120],[140,141,134],{"url":208,"sources":209,"tags":210},"http://www.vupen.com/english/advisories/2006/4747",[126,120],[128,146,134],{"url":212,"sources":213,"tags":214},"http://www.kb.cert.org/vuls/id/352825",[126,120],[140,215,216],"X Refsource CERT VN","US Government Resource",{"url":218,"sources":219,"tags":220},"http://www.securityfocus.com/archive/1/451057/100/0/threaded",[126,120],[221,222],"Mailing List","X Refsource BUGTRAQ",{"url":224,"sources":225,"tags":226},"http://secunia.com/advisories/23111",[126,120],[140,141,134],{"url":228,"sources":229,"tags":230},"http://secunia.com/advisories/23183",[126,120],[140,141,134],{"url":232,"sources":233,"tags":234},"http://www.debian.org/security/2006/dsa-1243",[126,120],[134,135],{"url":73,"sources":236,"tags":237},[126,120],[128,238,154],"X Refsource BID",{"url":240,"sources":241,"tags":242},"http://security.gentoo.org/glsa/glsa-200611-20.xml",[126,120],[134,193],{"url":244,"sources":245,"tags":246},"http://www.securityfocus.com/archive/1/451422/100/200/threaded",[126,120],[221,222],{"url":248,"sources":249,"tags":250},"http://www.mandriva.com/security/advisories?name=MDKSA-2006:214",[126,120],[134,251],"X Refsource MANDRIVA",{"url":253,"sources":254,"tags":255},"http://secunia.com/advisories/23006",[126,120],[140,141,134],{"url":257,"sources":258,"tags":259},"http://secunia.com/advisories/22787",[126,120],[140,141,134],{"url":261,"sources":262,"tags":263},"https://issues.rpath.com/browse/RPL-850",[126,120],[264],"X Refsource CONFIRM",{"url":266,"sources":267,"tags":268},"https://exchange.xforce.ibmcloud.com/vulnerabilities/30555",[126,120],[128,129],{"url":270,"sources":271,"tags":272},"http://secunia.com/advisories/23118",[126,120],[140,141,134],{"url":274,"sources":275,"tags":276},"http://secunia.com/advisories/24649",[126,120],[140,141,134],{"url":278,"sources":279,"tags":280},"http://www.novell.com/linux/security/advisories/2006_29_sr.html",[126,120],[134,180],{"url":282,"sources":283,"tags":284},"http://www.securityfocus.com/archive/1/452868/100/0/threaded",[126,120],[221,222],{"url":286,"sources":287,"tags":288},"http://www.mandriva.com/security/advisories?name=MDKSA-2006:229",[126,120],[134,251],{"url":290,"sources":291,"tags":292},"http://www.ubuntu.com/usn/usn-390-3",[126,120],[134,202],{"url":294,"sources":295,"tags":296},"http://www.ubuntu.com/usn/usn-390-1",[126,120],[134,202],[],{"date":299,"score":116,"percentile":300},"2026-04-07",0.96707,[302,306,309,312,315,318,321,323,325,328,331,334,336,339,341,344,346,349,352,355,357,360,363,366,368,371,374,377,380,382,385,388,391,393,396,399,402,405,408,411,413,416,418,421,424,426,428,431,433,436,438,441,444,447,450,452,455,458,460,463,466,468,470,473,475,477,479,482,485,487,490,492,495,498,501,504,507,509,511,514,517,519,522,524,526,528,531,533,535,538],{"date":303,"score":304,"percentile":305},"2025-11-04",0.28511,0.963,{"date":307,"score":304,"percentile":308},"2025-11-05",0.96299,{"date":310,"score":304,"percentile":311},"2025-11-06",0.96302,{"date":313,"score":304,"percentile":314},"2025-11-07",0.96304,{"date":316,"score":304,"percentile":317},"2025-11-08",0.96306,{"date":319,"score":304,"percentile":320},"2025-11-09",0.96305,{"date":322,"score":304,"percentile":320},"2025-11-10",{"date":324,"score":304,"percentile":320},"2025-11-11",{"date":326,"score":304,"percentile":327},"2025-11-12",0.96308,{"date":329,"score":304,"percentile":330},"2025-11-13",0.96309,{"date":332,"score":304,"percentile":333},"2025-11-14",0.96311,{"date":335,"score":304,"percentile":333},"2025-11-15",{"date":337,"score":304,"percentile":338},"2025-11-16",0.9631,{"date":340,"score":304,"percentile":333},"2025-11-17",{"date":342,"score":304,"percentile":343},"2025-11-18",0.9624,{"date":345,"score":304,"percentile":343},"2025-11-19",{"date":347,"score":304,"percentile":348},"2025-11-20",0.96241,{"date":350,"score":304,"percentile":351},"2025-11-21",0.96321,{"date":353,"score":304,"percentile":354},"2025-11-22",0.96322,{"date":356,"score":304,"percentile":354},"2025-11-23",{"date":358,"score":304,"percentile":359},"2025-11-24",0.96325,{"date":361,"score":304,"percentile":362},"2025-11-25",0.96327,{"date":364,"score":304,"percentile":365},"2025-11-26",0.96329,{"date":367,"score":304,"percentile":365},"2025-11-27",{"date":369,"score":304,"percentile":370},"2025-11-28",0.96328,{"date":372,"score":304,"percentile":373},"2025-11-29",0.9633,{"date":375,"score":304,"percentile":376},"2025-11-30",0.96332,{"date":378,"score":304,"percentile":379},"2025-12-01",0.96362,{"date":381,"score":304,"percentile":379},"2025-12-02",{"date":383,"score":304,"percentile":384},"2025-12-03",0.96364,{"date":386,"score":304,"percentile":387},"2025-12-04",0.96333,{"date":389,"score":304,"percentile":390},"2025-12-05",0.96336,{"date":392,"score":304,"percentile":390},"2025-12-06",{"date":394,"score":304,"percentile":395},"2025-12-07",0.96334,{"date":397,"score":304,"percentile":398},"2025-12-08",0.96335,{"date":400,"score":304,"percentile":401},"2025-12-09",0.96338,{"date":403,"score":304,"percentile":404},"2025-12-10",0.96342,{"date":406,"score":304,"percentile":407},"2025-12-11",0.96343,{"date":409,"score":304,"percentile":410},"2025-12-12",0.96346,{"date":412,"score":304,"percentile":407},"2025-12-13",{"date":414,"score":304,"percentile":415},"2025-12-14",0.96339,{"date":417,"score":304,"percentile":404},"2025-12-15",{"date":419,"score":304,"percentile":420},"2025-12-16",0.96347,{"date":422,"score":304,"percentile":423},"2025-12-17",0.9635,{"date":425,"score":304,"percentile":423},"2025-12-18",{"date":427,"score":304,"percentile":423},"2025-12-19",{"date":429,"score":304,"percentile":430},"2025-12-20",0.96351,{"date":432,"score":304,"percentile":430},"2025-12-21",{"date":434,"score":304,"percentile":435},"2025-12-22",0.96352,{"date":437,"score":304,"percentile":435},"2025-12-23",{"date":439,"score":304,"percentile":440},"2025-12-24",0.96355,{"date":442,"score":304,"percentile":443},"2025-12-25",0.9636,{"date":445,"score":304,"percentile":446},"2025-12-26",0.96358,{"date":448,"score":304,"percentile":449},"2025-12-27",0.96384,{"date":451,"score":304,"percentile":440},"2025-12-28",{"date":453,"score":304,"percentile":454},"2025-12-29",0.96356,{"date":456,"score":304,"percentile":457},"2025-12-30",0.96357,{"date":459,"score":304,"percentile":379},"2025-12-31",{"date":461,"score":304,"percentile":462},"2026-01-01",0.96394,{"date":464,"score":304,"percentile":465},"2026-01-02",0.96391,{"date":467,"score":304,"percentile":465},"2026-01-03",{"date":469,"score":304,"percentile":443},"2026-01-04",{"date":471,"score":304,"percentile":472},"2026-01-05",0.96359,{"date":474,"score":304,"percentile":379},"2026-01-06",{"date":476,"score":304,"percentile":379},"2026-01-07",{"date":478,"score":304,"percentile":384},"2026-01-08",{"date":480,"score":304,"percentile":481},"2026-01-09",0.96367,{"date":483,"score":304,"percentile":484},"2026-01-10",0.96369,{"date":486,"score":304,"percentile":484},"2026-01-11",{"date":488,"score":304,"percentile":489},"2026-01-12",0.9637,{"date":491,"score":304,"percentile":484},"2026-01-13",{"date":493,"score":304,"percentile":494},"2026-01-14",0.96375,{"date":496,"score":304,"percentile":497},"2026-01-15",0.96377,{"date":499,"score":304,"percentile":500},"2026-01-16",0.9638,{"date":502,"score":304,"percentile":503},"2026-01-17",0.96381,{"date":505,"score":304,"percentile":506},"2026-01-18",0.96383,{"date":508,"score":304,"percentile":506},"2026-01-19",{"date":510,"score":304,"percentile":449},"2026-01-20",{"date":512,"score":304,"percentile":513},"2026-01-21",0.96385,{"date":515,"score":304,"percentile":516},"2026-01-22",0.96386,{"date":518,"score":304,"percentile":465},"2026-01-23",{"date":520,"score":304,"percentile":521},"2026-01-24",0.96393,{"date":523,"score":304,"percentile":462},"2026-01-25",{"date":525,"score":304,"percentile":462},"2026-01-26",{"date":527,"score":304,"percentile":521},"2026-01-27",{"date":529,"score":304,"percentile":530},"2026-01-28",0.96395,{"date":532,"score":304,"percentile":530},"2026-01-29",{"date":534,"score":304,"percentile":462},"2026-01-30",{"date":536,"score":304,"percentile":537},"2026-01-31",0.96396,{"date":539,"score":304,"percentile":540},"2026-02-01",0.96425,[542],{"source":120,"cvss_v2_0":543,"cvss_v3_0":9,"cvss_v3_1":9,"cvss_v4_0":9},{"baseScore":118,"baseSeverity":9,"vectorString":121,"impactScore":544,"exploitabilityScore":545},6.4,4.9,[547],{"ecosystem":9,"name":548,"vendor":549,"product":548,"cpe_part":550,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":551},"gv","gnu","a",[552,555,557,559],{"version":553,"is_range":76,"range_type":554,"version_start":9,"version_start_type":9,"version_end":9,"version_end_type":9,"fixed_in":9},"3.5.8","cpe",{"version":556,"is_range":76,"range_type":554,"version_start":9,"version_start_type":9,"version_end":9,"version_end_type":9,"fixed_in":9},"3.6.0",{"version":558,"is_range":76,"range_type":554,"version_start":9,"version_start_type":9,"version_end":9,"version_end_type":9,"fixed_in":9},"3.6.1",{"version":560,"is_range":76,"range_type":554,"version_start":9,"version_start_type":9,"version_end":9,"version_end_type":9,"fixed_in":9},"3.6.2"]