Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/gdm3@2.30.5-6squeeze5
Typedeb
Namespacedebian
Namegdm3
Version2.30.5-6squeeze5
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version3.38.2.1-1
Latest_non_vulnerable_version3.38.2.1-1
Affected_by_vulnerabilities
0
url VCID-2q3t-1t3f-wyfp
vulnerability_id VCID-2q3t-1t3f-wyfp
summary gdm: local DoS possible when cancelling and disable-user-list=true when fallback greeter is used
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7273.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7273.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-7273
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20769
published_at 2026-04-01T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20921
published_at 2026-04-02T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.2098
published_at 2026-04-04T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20694
published_at 2026-04-07T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20771
published_at 2026-04-08T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20832
published_at 2026-04-09T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20848
published_at 2026-04-11T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20805
published_at 2026-04-12T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20753
published_at 2026-04-13T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20744
published_at 2026-04-16T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20736
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-7273
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7273
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1050745
reference_id 1050745
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1050745
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683338
reference_id 683338
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=683338
fixed_packages
0
url pkg:deb/debian/gdm3@3.14.1-7
purl pkg:deb/debian/gdm3@3.14.1-7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-b3s2-mrwm-4yaq
1
vulnerability VCID-k4gx-14zs-ckg1
2
vulnerability VCID-kef8-7jyh-cucc
3
vulnerability VCID-q4j9-1hx3-gkf6
4
vulnerability VCID-w9d9-mdj2-suc4
5
vulnerability VCID-y7nj-xejq-qbab
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdm3@3.14.1-7
aliases CVE-2013-7273
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2q3t-1t3f-wyfp
1
url VCID-b3s2-mrwm-4yaq
vulnerability_id VCID-b3s2-mrwm-4yaq
summary gdm: Crash when holding Escape in log screen
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172328.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172328.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7496.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7496.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7496
reference_id
reference_type
scores
0
value 0.00079
scoring_system epss
scoring_elements 0.2333
published_at 2026-04-01T12:55:00Z
1
value 0.00079
scoring_system epss
scoring_elements 0.23385
published_at 2026-04-18T12:55:00Z
2
value 0.00079
scoring_system epss
scoring_elements 0.23373
published_at 2026-04-13T12:55:00Z
3
value 0.00079
scoring_system epss
scoring_elements 0.23391
published_at 2026-04-16T12:55:00Z
4
value 0.00079
scoring_system epss
scoring_elements 0.23503
published_at 2026-04-02T12:55:00Z
5
value 0.00079
scoring_system epss
scoring_elements 0.2354
published_at 2026-04-04T12:55:00Z
6
value 0.00079
scoring_system epss
scoring_elements 0.23323
published_at 2026-04-07T12:55:00Z
7
value 0.00079
scoring_system epss
scoring_elements 0.23396
published_at 2026-04-08T12:55:00Z
8
value 0.00079
scoring_system epss
scoring_elements 0.23447
published_at 2026-04-09T12:55:00Z
9
value 0.00079
scoring_system epss
scoring_elements 0.23466
published_at 2026-04-11T12:55:00Z
10
value 0.00079
scoring_system epss
scoring_elements 0.23427
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7496
3
reference_url https://bugzilla.gnome.org/show_bug.cgi?id=758032
reference_id
reference_type
scores
url https://bugzilla.gnome.org/show_bug.cgi?id=758032
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7496
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7496
5
reference_url https://download.gnome.org/sources/gdm/3.18/gdm-3.18.2.news
reference_id
reference_type
scores
url https://download.gnome.org/sources/gdm/3.18/gdm-3.18.2.news
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url http://www.openwall.com/lists/oss-security/2015/11/17/10
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/11/17/10
8
reference_url http://www.openwall.com/lists/oss-security/2015/11/17/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/11/17/8
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1283279
reference_id 1283279
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1283279
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome_display_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome_display_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome_display_manager:*:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7496
reference_id CVE-2015-7496
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2015-7496
13
reference_url https://access.redhat.com/errata/RHSA-2017:2128
reference_id RHSA-2017:2128
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2128
fixed_packages
0
url pkg:deb/debian/gdm3@3.22.3-3%2Bdeb9u2
purl pkg:deb/debian/gdm3@3.22.3-3%2Bdeb9u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k4gx-14zs-ckg1
1
vulnerability VCID-kef8-7jyh-cucc
2
vulnerability VCID-q4j9-1hx3-gkf6
3
vulnerability VCID-w9d9-mdj2-suc4
4
vulnerability VCID-y7nj-xejq-qbab
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdm3@3.22.3-3%252Bdeb9u2
aliases CVE-2015-7496
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b3s2-mrwm-4yaq
2
url VCID-k4gx-14zs-ckg1
vulnerability_id VCID-k4gx-14zs-ckg1
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14424.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14424.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-14424
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15324
published_at 2026-04-08T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15362
published_at 2026-04-02T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15432
published_at 2026-04-04T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15236
published_at 2026-04-07T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15374
published_at 2026-04-09T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15335
published_at 2026-04-11T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15296
published_at 2026-04-12T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.1523
published_at 2026-04-13T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15145
published_at 2026-04-16T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15152
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-14424
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14424
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14424
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1606915
reference_id 1606915
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1606915
5
reference_url https://usn.ubuntu.com/3737-1/
reference_id USN-3737-1
reference_type
scores
url https://usn.ubuntu.com/3737-1/
fixed_packages
0
url pkg:deb/debian/gdm3@3.22.3-3%2Bdeb9u2
purl pkg:deb/debian/gdm3@3.22.3-3%2Bdeb9u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-k4gx-14zs-ckg1
1
vulnerability VCID-kef8-7jyh-cucc
2
vulnerability VCID-q4j9-1hx3-gkf6
3
vulnerability VCID-w9d9-mdj2-suc4
4
vulnerability VCID-y7nj-xejq-qbab
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdm3@3.22.3-3%252Bdeb9u2
1
url pkg:deb/debian/gdm3@3.30.2-3
purl pkg:deb/debian/gdm3@3.30.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-w9d9-mdj2-suc4
1
vulnerability VCID-y7nj-xejq-qbab
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdm3@3.30.2-3
aliases CVE-2018-14424
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k4gx-14zs-ckg1
3
url VCID-kef8-7jyh-cucc
vulnerability_id VCID-kef8-7jyh-cucc
summary gdm: lock screen bypass when timed login is enabled
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3825.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3825.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3825
reference_id
reference_type
scores
0
value 0.00075
scoring_system epss
scoring_elements 0.22573
published_at 2026-04-01T12:55:00Z
1
value 0.00075
scoring_system epss
scoring_elements 0.22642
published_at 2026-04-18T12:55:00Z
2
value 0.00075
scoring_system epss
scoring_elements 0.22708
published_at 2026-04-09T12:55:00Z
3
value 0.00075
scoring_system epss
scoring_elements 0.22726
published_at 2026-04-11T12:55:00Z
4
value 0.00075
scoring_system epss
scoring_elements 0.22688
published_at 2026-04-12T12:55:00Z
5
value 0.00075
scoring_system epss
scoring_elements 0.2263
published_at 2026-04-13T12:55:00Z
6
value 0.00075
scoring_system epss
scoring_elements 0.22646
published_at 2026-04-16T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22746
published_at 2026-04-02T12:55:00Z
8
value 0.00075
scoring_system epss
scoring_elements 0.2279
published_at 2026-04-04T12:55:00Z
9
value 0.00075
scoring_system epss
scoring_elements 0.22581
published_at 2026-04-07T12:55:00Z
10
value 0.00075
scoring_system epss
scoring_elements 0.22657
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3825
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3825
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3825
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3825
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1672825
reference_id 1672825
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1672825
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921764
reference_id 921764
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921764
7
reference_url https://security.archlinux.org/ASA-201903-3
reference_id ASA-201903-3
reference_type
scores
url https://security.archlinux.org/ASA-201903-3
8
reference_url https://security.archlinux.org/AVG-879
reference_id AVG-879
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-879
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome_display_manager:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome_display_manager:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome_display_manager:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3825
reference_id CVE-2019-3825
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
1
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
2
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-3825
14
reference_url https://access.redhat.com/errata/RHSA-2020:1766
reference_id RHSA-2020:1766
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1766
15
reference_url https://usn.ubuntu.com/3892-1/
reference_id USN-3892-1
reference_type
scores
url https://usn.ubuntu.com/3892-1/
fixed_packages
0
url pkg:deb/debian/gdm3@3.30.2-3
purl pkg:deb/debian/gdm3@3.30.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-w9d9-mdj2-suc4
1
vulnerability VCID-y7nj-xejq-qbab
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdm3@3.30.2-3
aliases CVE-2019-3825
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kef8-7jyh-cucc
4
url VCID-p629-uf8d-h3bd
vulnerability_id VCID-p629-uf8d-h3bd
summary
This GLSA contains notification of vulnerabilities found in several
    Gentoo packages which have been fixed prior to January 1, 2012. The worst
    of these vulnerabilities could lead to local privilege escalation and
    remote code execution. Please see the package list and CVE identifiers
    below for more information.
references
0
reference_url http://ftp.gnome.org/pub/GNOME/sources/gdm/2.32/gdm-2.32.1.news
reference_id
reference_type
scores
url http://ftp.gnome.org/pub/GNOME/sources/gdm/2.32/gdm-2.32.1.news
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057333.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057333.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057931.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057931.html
3
reference_url http://mail.gnome.org/archives/gdm-list/2011-March/msg00020.html
reference_id
reference_type
scores
url http://mail.gnome.org/archives/gdm-list/2011-March/msg00020.html
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0727.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-0727.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-0727
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.20003
published_at 2026-04-18T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.20035
published_at 2026-04-01T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.20182
published_at 2026-04-02T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.2024
published_at 2026-04-04T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.19966
published_at 2026-04-07T12:55:00Z
5
value 0.00064
scoring_system epss
scoring_elements 0.20045
published_at 2026-04-08T12:55:00Z
6
value 0.00064
scoring_system epss
scoring_elements 0.20104
published_at 2026-04-09T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.20122
published_at 2026-04-11T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.20077
published_at 2026-04-12T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.20019
published_at 2026-04-13T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.2
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-0727
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0727
7
reference_url http://secunia.com/advisories/43714
reference_id
reference_type
scores
url http://secunia.com/advisories/43714
8
reference_url http://secunia.com/advisories/43854
reference_id
reference_type
scores
url http://secunia.com/advisories/43854
9
reference_url http://secunia.com/advisories/44021
reference_id
reference_type
scores
url http://secunia.com/advisories/44021
10
reference_url http://securitytracker.com/id?1025264
reference_id
reference_type
scores
url http://securitytracker.com/id?1025264
11
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/66377
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/66377
12
reference_url http://www.debian.org/security/2011/dsa-2205
reference_id
reference_type
scores
url http://www.debian.org/security/2011/dsa-2205
13
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2011:070
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2011:070
14
reference_url http://www.redhat.com/support/errata/RHSA-2011-0395.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2011-0395.html
15
reference_url http://www.securityfocus.com/bid/47063
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/47063
16
reference_url http://www.ubuntu.com/usn/USN-1099-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1099-1
17
reference_url http://www.vupen.com/english/advisories/2011/0786
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0786
18
reference_url http://www.vupen.com/english/advisories/2011/0787
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0787
19
reference_url http://www.vupen.com/english/advisories/2011/0797
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0797
20
reference_url http://www.vupen.com/english/advisories/2011/0847
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0847
21
reference_url http://www.vupen.com/english/advisories/2011/0911
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2011/0911
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=688323
reference_id 688323
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=688323
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdm:2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdm:2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.13:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdm:2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.14:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdm:2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.15:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdm:2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.16:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdm:2.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.17:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdm:2.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.18:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdm:2.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.19:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdm:2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.2:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdm:2.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.20:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdm:2.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.21:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdm:2.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.22:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdm:2.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.23:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdm:2.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.24:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdm:2.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.25:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdm:2.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.26:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdm:2.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.27:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdm:2.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.28:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.29:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdm:2.29:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.29:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdm:2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.3:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.30:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdm:2.30:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.30:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.31:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdm:2.31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.31:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.32:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdm:2.32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.32:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdm:2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.4:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdm:2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.5:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdm:2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.6:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdm:2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdm:2.8:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/detail/CVE-2011-0727
reference_id CVE-2011-0727
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2011-0727
51
reference_url https://security.gentoo.org/glsa/201412-09
reference_id GLSA-201412-09
reference_type
scores
url https://security.gentoo.org/glsa/201412-09
52
reference_url https://access.redhat.com/errata/RHSA-2011:0395
reference_id RHSA-2011:0395
reference_type
scores
url https://access.redhat.com/errata/RHSA-2011:0395
53
reference_url https://usn.ubuntu.com/1099-1/
reference_id USN-1099-1
reference_type
scores
url https://usn.ubuntu.com/1099-1/
fixed_packages
0
url pkg:deb/debian/gdm3@3.4.1-8
purl pkg:deb/debian/gdm3@3.4.1-8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2q3t-1t3f-wyfp
1
vulnerability VCID-b3s2-mrwm-4yaq
2
vulnerability VCID-k4gx-14zs-ckg1
3
vulnerability VCID-kef8-7jyh-cucc
4
vulnerability VCID-q4j9-1hx3-gkf6
5
vulnerability VCID-w9d9-mdj2-suc4
6
vulnerability VCID-y7nj-xejq-qbab
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdm3@3.4.1-8
aliases CVE-2011-0727
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p629-uf8d-h3bd
5
url VCID-q4j9-1hx3-gkf6
vulnerability_id VCID-q4j9-1hx3-gkf6
summary gdm: lock screen can be circumvented when autologin is set
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12164.json
reference_id
reference_type
scores
0
value 4.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12164.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12164
reference_id
reference_type
scores
0
value 0.00136
scoring_system epss
scoring_elements 0.33319
published_at 2026-04-01T12:55:00Z
1
value 0.00136
scoring_system epss
scoring_elements 0.33456
published_at 2026-04-02T12:55:00Z
2
value 0.00136
scoring_system epss
scoring_elements 0.33487
published_at 2026-04-04T12:55:00Z
3
value 0.00136
scoring_system epss
scoring_elements 0.33328
published_at 2026-04-07T12:55:00Z
4
value 0.00136
scoring_system epss
scoring_elements 0.33374
published_at 2026-04-08T12:55:00Z
5
value 0.00136
scoring_system epss
scoring_elements 0.33408
published_at 2026-04-09T12:55:00Z
6
value 0.00136
scoring_system epss
scoring_elements 0.33412
published_at 2026-04-11T12:55:00Z
7
value 0.00136
scoring_system epss
scoring_elements 0.3337
published_at 2026-04-12T12:55:00Z
8
value 0.00136
scoring_system epss
scoring_elements 0.33348
published_at 2026-04-13T12:55:00Z
9
value 0.00136
scoring_system epss
scoring_elements 0.33382
published_at 2026-04-16T12:55:00Z
10
value 0.00136
scoring_system epss
scoring_elements 0.33358
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12164
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12164
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12164
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1490417
reference_id 1490417
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1490417
fixed_packages
0
url pkg:deb/debian/gdm3@3.30.2-3
purl pkg:deb/debian/gdm3@3.30.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-w9d9-mdj2-suc4
1
vulnerability VCID-y7nj-xejq-qbab
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdm3@3.30.2-3
aliases CVE-2017-12164
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q4j9-1hx3-gkf6
6
url VCID-w9d9-mdj2-suc4
vulnerability_id VCID-w9d9-mdj2-suc4
summary gdm: inability to timely contact accountservice via dbus leads gnome-initial-setup to creation of account with admin privileges
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16125.json
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-16125.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-16125
reference_id
reference_type
scores
0
value 0.22102
scoring_system epss
scoring_elements 0.95755
published_at 2026-04-01T12:55:00Z
1
value 0.22102
scoring_system epss
scoring_elements 0.95805
published_at 2026-04-18T12:55:00Z
2
value 0.22102
scoring_system epss
scoring_elements 0.95791
published_at 2026-04-13T12:55:00Z
3
value 0.22102
scoring_system epss
scoring_elements 0.95801
published_at 2026-04-16T12:55:00Z
4
value 0.22102
scoring_system epss
scoring_elements 0.95764
published_at 2026-04-02T12:55:00Z
5
value 0.22102
scoring_system epss
scoring_elements 0.95771
published_at 2026-04-04T12:55:00Z
6
value 0.22102
scoring_system epss
scoring_elements 0.95774
published_at 2026-04-07T12:55:00Z
7
value 0.22102
scoring_system epss
scoring_elements 0.95782
published_at 2026-04-08T12:55:00Z
8
value 0.22102
scoring_system epss
scoring_elements 0.95786
published_at 2026-04-09T12:55:00Z
9
value 0.22102
scoring_system epss
scoring_elements 0.95789
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-16125
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16125
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16125
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1901994
reference_id 1901994
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1901994
5
reference_url https://security.archlinux.org/ASA-202011-5
reference_id ASA-202011-5
reference_type
scores
url https://security.archlinux.org/ASA-202011-5
6
reference_url https://security.archlinux.org/AVG-1264
reference_id AVG-1264
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1264
7
reference_url https://access.redhat.com/errata/RHSA-2021:1586
reference_id RHSA-2021:1586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1586
8
reference_url https://usn.ubuntu.com/4614-1/
reference_id USN-4614-1
reference_type
scores
url https://usn.ubuntu.com/4614-1/
fixed_packages
0
url pkg:deb/debian/gdm3@3.38.2.1-1
purl pkg:deb/debian/gdm3@3.38.2.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdm3@3.38.2.1-1
aliases CVE-2020-16125
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w9d9-mdj2-suc4
7
url VCID-y7nj-xejq-qbab
vulnerability_id VCID-y7nj-xejq-qbab
summary gdm: lock screen bypass when autologin is set
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27837.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27837.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-27837
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12534
published_at 2026-04-01T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12416
published_at 2026-04-18T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12509
published_at 2026-04-13T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12412
published_at 2026-04-16T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12639
published_at 2026-04-02T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.1268
published_at 2026-04-04T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12492
published_at 2026-04-07T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12571
published_at 2026-04-08T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12621
published_at 2026-04-09T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12589
published_at 2026-04-11T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.12549
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-27837
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27837
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27837
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1906812
reference_id 1906812
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1906812
5
reference_url https://security.archlinux.org/AVG-1380
reference_id AVG-1380
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1380
fixed_packages
0
url pkg:deb/debian/gdm3@3.38.2.1-1
purl pkg:deb/debian/gdm3@3.38.2.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdm3@3.38.2.1-1
aliases CVE-2020-27837
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y7nj-xejq-qbab
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/gdm3@2.30.5-6squeeze5