[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-DEBIAN-CVE-2022-37434":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-04T21:10:30.191Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":16,"duplicates":21,"related":22,"reserved_at":9,"published_at":23,"modified_at":24,"state":9,"summary":25,"references_raw":27,"kevs":34,"epss":9,"epss_history":35,"metrics":36,"affected":42},"DEBIAN-CVE-2022-37434","zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).",null,[],[],[],[14],{"_key":15},"CVE-2022-37434",[17,19],{"_key":18},"DLA-3103-1",{"_key":20},"DSA-5218-1",[],[],"2022-08-05T07:15:07.240Z","2026-03-17T02:47:45.414210Z",{"cisa_kev":26,"cisa_ransomware":26,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[28],{"url":29,"sources":30,"tags":32},"https://security-tracker.debian.org/tracker/CVE-2022-37434",[31],"osv_debian",[33],"Advisory",[],[],[37],{"source":31,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":38,"cvss_v4_0":9},{"baseScore":39,"baseSeverity":9,"vectorString":40,"impactScore":39,"exploitabilityScore":41},9.8,"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",10,[43,59],{"ecosystem":44,"name":45,"vendor":46,"product":45,"cpe_part":9,"purl_type":47,"purl_namespace":46,"purl_name":45,"source":9,"versions":48},"Debian","libz-mingw-w64","debian","deb",[49,53,57,58],{"version":50,"is_range":51,"range_type":52,"version_start":9,"version_start_type":9,"version_end":9,"version_end_type":9,"fixed_in":9},"all",true,"ecosystem",{"version":54,"is_range":51,"range_type":52,"version_start":9,"version_start_type":9,"version_end":55,"version_end_type":56,"fixed_in":9},"lt1_2_12+dfsg_2","1.2.12+dfsg-2","excluding",{"version":54,"is_range":51,"range_type":52,"version_start":9,"version_start_type":9,"version_end":55,"version_end_type":56,"fixed_in":9},{"version":54,"is_range":51,"range_type":52,"version_start":9,"version_start_type":9,"version_end":55,"version_end_type":56,"fixed_in":9},{"ecosystem":44,"name":60,"vendor":46,"product":60,"cpe_part":9,"purl_type":47,"purl_namespace":46,"purl_name":60,"source":9,"versions":61},"zlib",[62,65,68,69],{"version":63,"is_range":51,"range_type":52,"version_start":9,"version_start_type":9,"version_end":64,"version_end_type":56,"fixed_in":9},"lt1:1_2_11_dfsg_2+deb11u2","1:1.2.11.dfsg-2+deb11u2",{"version":66,"is_range":51,"range_type":52,"version_start":9,"version_start_type":9,"version_end":67,"version_end_type":56,"fixed_in":9},"lt1:1_2_11_dfsg_4_1","1:1.2.11.dfsg-4.1",{"version":66,"is_range":51,"range_type":52,"version_start":9,"version_start_type":9,"version_end":67,"version_end_type":56,"fixed_in":9},{"version":66,"is_range":51,"range_type":52,"version_start":9,"version_start_type":9,"version_end":67,"version_end_type":56,"fixed_in":9}]