Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/gnome-shell@3.14.2-3
Typedeb
Namespacedebian
Namegnome-shell
Version3.14.2-3
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version48.7-0+deb13u2
Latest_non_vulnerable_version48.7-0+deb13u2
Affected_by_vulnerabilities
0
url VCID-3hgy-yca4-9qfw
vulnerability_id VCID-3hgy-yca4-9qfw
summary
An information disclosure vulnerability in GNOME Shell might allow
    local attackers to obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-17489.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-17489.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-17489
reference_id
reference_type
scores
0
value 0.00149
scoring_system epss
scoring_elements 0.35289
published_at 2026-04-01T12:55:00Z
1
value 0.00149
scoring_system epss
scoring_elements 0.35488
published_at 2026-04-02T12:55:00Z
2
value 0.00149
scoring_system epss
scoring_elements 0.35513
published_at 2026-04-04T12:55:00Z
3
value 0.00149
scoring_system epss
scoring_elements 0.35396
published_at 2026-04-07T12:55:00Z
4
value 0.00149
scoring_system epss
scoring_elements 0.35442
published_at 2026-04-08T12:55:00Z
5
value 0.00149
scoring_system epss
scoring_elements 0.35467
published_at 2026-04-09T12:55:00Z
6
value 0.00149
scoring_system epss
scoring_elements 0.35477
published_at 2026-04-11T12:55:00Z
7
value 0.00149
scoring_system epss
scoring_elements 0.35433
published_at 2026-04-12T12:55:00Z
8
value 0.00149
scoring_system epss
scoring_elements 0.3541
published_at 2026-04-13T12:55:00Z
9
value 0.00149
scoring_system epss
scoring_elements 0.3545
published_at 2026-04-16T12:55:00Z
10
value 0.00149
scoring_system epss
scoring_elements 0.35438
published_at 2026-04-18T12:55:00Z
11
value 0.00149
scoring_system epss
scoring_elements 0.35385
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-17489
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17489
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1868418
reference_id 1868418
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1868418
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968311
reference_id 968311
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=968311
6
reference_url https://security.gentoo.org/glsa/202009-08
reference_id GLSA-202009-08
reference_type
scores
url https://security.gentoo.org/glsa/202009-08
7
reference_url https://access.redhat.com/errata/RHSA-2022:1814
reference_id RHSA-2022:1814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1814
8
reference_url https://usn.ubuntu.com/4464-1/
reference_id USN-4464-1
reference_type
scores
url https://usn.ubuntu.com/4464-1/
fixed_packages
0
url pkg:deb/debian/gnome-shell@3.38.6-1~deb11u2
purl pkg:deb/debian/gnome-shell@3.38.6-1~deb11u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nq2k-cj2q-g7dc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnome-shell@3.38.6-1~deb11u2
aliases CVE-2020-17489
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3hgy-yca4-9qfw
1
url VCID-8za5-vf91-4ke3
vulnerability_id VCID-8za5-vf91-4ke3
summary gnome-shell: partial lock screen bypass
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00023.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00049.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00049.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3820.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3820.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3820
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13694
published_at 2026-04-01T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.1364
published_at 2026-04-21T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13745
published_at 2026-04-11T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13707
published_at 2026-04-12T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13658
published_at 2026-04-13T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13569
published_at 2026-04-16T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13566
published_at 2026-04-18T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13789
published_at 2026-04-02T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13845
published_at 2026-04-04T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13644
published_at 2026-04-07T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13726
published_at 2026-04-08T12:55:00Z
11
value 0.00045
scoring_system epss
scoring_elements 0.13777
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3820
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3820
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3820
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3820
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://gitlab.gnome.org/GNOME/gnome-shell/issues/851
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/gnome-shell/issues/851
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1669391
reference_id 1669391
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1669391
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921490
reference_id 921490
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921490
10
reference_url https://security.archlinux.org/ASA-201903-3
reference_id ASA-201903-3
reference_type
scores
url https://security.archlinux.org/ASA-201903-3
11
reference_url https://security.archlinux.org/AVG-879
reference_id AVG-879
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-879
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome-shell:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3820
reference_id CVE-2019-3820
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
1
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
2
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://nvd.nist.gov/vuln/detail/CVE-2019-3820
19
reference_url https://access.redhat.com/errata/RHSA-2019:3553
reference_id RHSA-2019:3553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3553
20
reference_url https://access.redhat.com/errata/RHSA-2020:1021
reference_id RHSA-2020:1021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1021
21
reference_url https://usn.ubuntu.com/3966-1/
reference_id USN-3966-1
reference_type
scores
url https://usn.ubuntu.com/3966-1/
22
reference_url https://usn.ubuntu.com/7052-1/
reference_id USN-7052-1
reference_type
scores
url https://usn.ubuntu.com/7052-1/
fixed_packages
0
url pkg:deb/debian/gnome-shell@3.30.2-11~deb10u2
purl pkg:deb/debian/gnome-shell@3.30.2-11~deb10u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3hgy-yca4-9qfw
1
vulnerability VCID-ug27-xpfs-mye2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnome-shell@3.30.2-11~deb10u2
aliases CVE-2019-3820
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8za5-vf91-4ke3
2
url VCID-r1fr-2h37-bybw
vulnerability_id VCID-r1fr-2h37-bybw
summary gnome-shell: Mishandling extensions that fail to reload
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8288.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8288.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-8288
reference_id
reference_type
scores
0
value 0.00309
scoring_system epss
scoring_elements 0.53984
published_at 2026-04-01T12:55:00Z
1
value 0.00309
scoring_system epss
scoring_elements 0.54091
published_at 2026-04-21T12:55:00Z
2
value 0.00309
scoring_system epss
scoring_elements 0.54066
published_at 2026-04-13T12:55:00Z
3
value 0.00309
scoring_system epss
scoring_elements 0.54105
published_at 2026-04-16T12:55:00Z
4
value 0.00309
scoring_system epss
scoring_elements 0.54109
published_at 2026-04-18T12:55:00Z
5
value 0.00309
scoring_system epss
scoring_elements 0.54002
published_at 2026-04-02T12:55:00Z
6
value 0.00309
scoring_system epss
scoring_elements 0.54028
published_at 2026-04-04T12:55:00Z
7
value 0.00309
scoring_system epss
scoring_elements 0.54004
published_at 2026-04-07T12:55:00Z
8
value 0.00309
scoring_system epss
scoring_elements 0.54056
published_at 2026-04-08T12:55:00Z
9
value 0.00309
scoring_system epss
scoring_elements 0.54055
published_at 2026-04-09T12:55:00Z
10
value 0.00309
scoring_system epss
scoring_elements 0.54102
published_at 2026-04-11T12:55:00Z
11
value 0.00309
scoring_system epss
scoring_elements 0.54084
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-8288
2
reference_url https://bugs.kali.org/view.php?id=2513
reference_id
reference_type
scores
url https://bugs.kali.org/view.php?id=2513
3
reference_url https://bugzilla.gnome.org/show_bug.cgi?id=781728
reference_id
reference_type
scores
url https://bugzilla.gnome.org/show_bug.cgi?id=781728
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8288
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8288
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/EasyScreenCast/EasyScreenCast/issues/46
reference_id
reference_type
scores
url https://github.com/EasyScreenCast/EasyScreenCast/issues/46
7
reference_url https://github.com/GNOME/gnome-shell/commit/ff425d1db7082e2755d2a405af53861552acf2a1
reference_id
reference_type
scores
url https://github.com/GNOME/gnome-shell/commit/ff425d1db7082e2755d2a405af53861552acf2a1
8
reference_url http://www.securityfocus.com/bid/98070
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/98070
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1446088
reference_id 1446088
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1446088
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.22.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome-shell:3.22.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.22.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.22.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome-shell:3.22.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.22.1:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.22.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome-shell:3.22.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.22.2:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.22.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome-shell:3.22.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.22.3:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.23.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome-shell:3.23.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.23.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.23.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome-shell:3.23.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.23.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.23.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome-shell:3.23.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.23.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.23.90:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome-shell:3.23.90:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.23.90:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.23.91:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome-shell:3.23.91:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.23.91:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.23.92:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome-shell:3.23.92:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.23.92:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.24.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome-shell:3.24.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.24.0:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.24.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome-shell:3.24.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.24.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-8288
reference_id CVE-2017-8288
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-8288
23
reference_url https://usn.ubuntu.com/7052-1/
reference_id USN-7052-1
reference_type
scores
url https://usn.ubuntu.com/7052-1/
fixed_packages
0
url pkg:deb/debian/gnome-shell@3.22.3-3
purl pkg:deb/debian/gnome-shell@3.22.3-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3hgy-yca4-9qfw
1
vulnerability VCID-8za5-vf91-4ke3
2
vulnerability VCID-ug27-xpfs-mye2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnome-shell@3.22.3-3
aliases CVE-2017-8288
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r1fr-2h37-bybw
3
url VCID-ug27-xpfs-mye2
vulnerability_id VCID-ug27-xpfs-mye2
summary The gnome-shell plugin 3.4.1 in GNOME allows remote attackers to force the download and installation of arbitrary extensions from extensions.gnome.org via a crafted web page.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-4427
reference_id
reference_type
scores
0
value 0.01026
scoring_system epss
scoring_elements 0.77315
published_at 2026-04-21T12:55:00Z
1
value 0.01026
scoring_system epss
scoring_elements 0.77221
published_at 2026-04-01T12:55:00Z
2
value 0.01026
scoring_system epss
scoring_elements 0.77227
published_at 2026-04-02T12:55:00Z
3
value 0.01026
scoring_system epss
scoring_elements 0.77256
published_at 2026-04-04T12:55:00Z
4
value 0.01026
scoring_system epss
scoring_elements 0.77238
published_at 2026-04-07T12:55:00Z
5
value 0.01026
scoring_system epss
scoring_elements 0.7727
published_at 2026-04-08T12:55:00Z
6
value 0.01026
scoring_system epss
scoring_elements 0.77279
published_at 2026-04-09T12:55:00Z
7
value 0.01026
scoring_system epss
scoring_elements 0.77306
published_at 2026-04-11T12:55:00Z
8
value 0.01026
scoring_system epss
scoring_elements 0.77286
published_at 2026-04-12T12:55:00Z
9
value 0.01026
scoring_system epss
scoring_elements 0.77283
published_at 2026-04-13T12:55:00Z
10
value 0.01026
scoring_system epss
scoring_elements 0.77323
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-4427
1
reference_url https://bugzilla.gnome.org/show_bug.cgi?id=684215
reference_id
reference_type
scores
url https://bugzilla.gnome.org/show_bug.cgi?id=684215
2
reference_url https://bugzilla.novell.com/show_bug.cgi?id=779473
reference_id
reference_type
scores
url https://bugzilla.novell.com/show_bug.cgi?id=779473
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4427
4
reference_url http://www.openwall.com/lists/oss-security/2012/09/08/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/08/1
5
reference_url http://www.openwall.com/lists/oss-security/2012/09/13/19
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/13/19
6
reference_url http://www.openwall.com/lists/oss-security/2012/09/13/26
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/13/26
7
reference_url http://www.openwall.com/lists/oss-security/2012/09/18/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/18/3
8
reference_url http://www.securityfocus.com/bid/55556
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55556
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome-shell:3.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.4.1:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-4427
reference_id CVE-2012-4427
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2012-4427
fixed_packages
0
url pkg:deb/debian/gnome-shell@3.38.6-1~deb11u2
purl pkg:deb/debian/gnome-shell@3.38.6-1~deb11u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-nq2k-cj2q-g7dc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnome-shell@3.38.6-1~deb11u2
aliases CVE-2012-4427
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ug27-xpfs-mye2
Fixing_vulnerabilities
0
url VCID-kjwz-sagx-zyg3
vulnerability_id VCID-kjwz-sagx-zyg3
summary gnome-shell: lockscreen bypass with printscreen key
references
0
reference_url http://openwall.com/lists/oss-security/2014/09/29/17
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2014/09/29/17
1
reference_url http://rhn.redhat.com/errata/RHSA-2015-0535.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0535.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7300.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-7300.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-7300
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.13475
published_at 2026-04-21T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13402
published_at 2026-04-18T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13517
published_at 2026-04-01T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13617
published_at 2026-04-02T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13678
published_at 2026-04-04T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13477
published_at 2026-04-07T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13558
published_at 2026-04-08T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13608
published_at 2026-04-09T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.1358
published_at 2026-04-11T12:55:00Z
9
value 0.00044
scoring_system epss
scoring_elements 0.13542
published_at 2026-04-12T12:55:00Z
10
value 0.00044
scoring_system epss
scoring_elements 0.13494
published_at 2026-04-13T12:55:00Z
11
value 0.00044
scoring_system epss
scoring_elements 0.13406
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-7300
4
reference_url https://bugzilla.gnome.org/show_bug.cgi?id=737456
reference_id
reference_type
scores
url https://bugzilla.gnome.org/show_bug.cgi?id=737456
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7300
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7300
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://git.gnome.org/browse/gnome-shell/commit/?id=a72dca361080ffc9f45ff90188a7cf013c3c4013
reference_id
reference_type
scores
url https://git.gnome.org/browse/gnome-shell/commit/?id=a72dca361080ffc9f45ff90188a7cf013c3c4013
8
reference_url https://git.gnome.org/browse/gnome-shell/commit/?id=f02b007337e61436aaa0e81a86ad707b6d277378
reference_id
reference_type
scores
url https://git.gnome.org/browse/gnome-shell/commit/?id=f02b007337e61436aaa0e81a86ad707b6d277378
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1147917
reference_id 1147917
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1147917
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.14.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gnome-shell:3.14.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gnome-shell:3.14.0:*:*:*:*:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-7300
reference_id CVE-2014-7300
reference_type
scores
0
value 7.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2014-7300
16
reference_url https://access.redhat.com/errata/RHSA-2015:0535
reference_id RHSA-2015:0535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0535
fixed_packages
0
url pkg:deb/debian/gnome-shell@3.14.2-3
purl pkg:deb/debian/gnome-shell@3.14.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3hgy-yca4-9qfw
1
vulnerability VCID-8za5-vf91-4ke3
2
vulnerability VCID-r1fr-2h37-bybw
3
vulnerability VCID-ug27-xpfs-mye2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnome-shell@3.14.2-3
aliases CVE-2014-7300
risk_score 3.2
exploitability 0.5
weighted_severity 6.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kjwz-sagx-zyg3
1
url VCID-kncq-w5uj-yugf
vulnerability_id VCID-kncq-w5uj-yugf
summary gnome-shell: blind command execution via activities search keyboard focus
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7220.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7220.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-7220
reference_id
reference_type
scores
0
value 0.00097
scoring_system epss
scoring_elements 0.26867
published_at 2026-04-01T12:55:00Z
1
value 0.00097
scoring_system epss
scoring_elements 0.26908
published_at 2026-04-02T12:55:00Z
2
value 0.00097
scoring_system epss
scoring_elements 0.26943
published_at 2026-04-04T12:55:00Z
3
value 0.00097
scoring_system epss
scoring_elements 0.26731
published_at 2026-04-07T12:55:00Z
4
value 0.00097
scoring_system epss
scoring_elements 0.26801
published_at 2026-04-08T12:55:00Z
5
value 0.00097
scoring_system epss
scoring_elements 0.26849
published_at 2026-04-09T12:55:00Z
6
value 0.00097
scoring_system epss
scoring_elements 0.26852
published_at 2026-04-11T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26807
published_at 2026-04-12T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.2675
published_at 2026-04-13T12:55:00Z
9
value 0.00097
scoring_system epss
scoring_elements 0.26757
published_at 2026-04-16T12:55:00Z
10
value 0.00097
scoring_system epss
scoring_elements 0.26729
published_at 2026-04-18T12:55:00Z
11
value 0.00097
scoring_system epss
scoring_elements 0.26692
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-7220
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7220
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7220
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1030431
reference_id 1030431
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1030431
fixed_packages
0
url pkg:deb/debian/gnome-shell@3.14.2-3
purl pkg:deb/debian/gnome-shell@3.14.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3hgy-yca4-9qfw
1
vulnerability VCID-8za5-vf91-4ke3
2
vulnerability VCID-r1fr-2h37-bybw
3
vulnerability VCID-ug27-xpfs-mye2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnome-shell@3.14.2-3
aliases CVE-2013-7220
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kncq-w5uj-yugf
2
url VCID-xb57-82md-nqdg
vulnerability_id VCID-xb57-82md-nqdg
summary gnome-shell: run command dialog visible above screen locker
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7221.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7221.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-7221
reference_id
reference_type
scores
0
value 0.00067
scoring_system epss
scoring_elements 0.20652
published_at 2026-04-01T12:55:00Z
1
value 0.00067
scoring_system epss
scoring_elements 0.20794
published_at 2026-04-02T12:55:00Z
2
value 0.00067
scoring_system epss
scoring_elements 0.20852
published_at 2026-04-04T12:55:00Z
3
value 0.00067
scoring_system epss
scoring_elements 0.20567
published_at 2026-04-07T12:55:00Z
4
value 0.00067
scoring_system epss
scoring_elements 0.20644
published_at 2026-04-08T12:55:00Z
5
value 0.00067
scoring_system epss
scoring_elements 0.20705
published_at 2026-04-09T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20725
published_at 2026-04-11T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20682
published_at 2026-04-12T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.20629
published_at 2026-04-13T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20616
published_at 2026-04-16T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.20613
published_at 2026-04-18T12:55:00Z
11
value 0.00067
scoring_system epss
scoring_elements 0.20604
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-7221
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7221
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7221
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1046839
reference_id 1046839
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1046839
fixed_packages
0
url pkg:deb/debian/gnome-shell@3.14.2-3
purl pkg:deb/debian/gnome-shell@3.14.2-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3hgy-yca4-9qfw
1
vulnerability VCID-8za5-vf91-4ke3
2
vulnerability VCID-r1fr-2h37-bybw
3
vulnerability VCID-ug27-xpfs-mye2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnome-shell@3.14.2-3
aliases CVE-2013-7221
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xb57-82md-nqdg
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/gnome-shell@3.14.2-3