Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/gtk%2B2.0@2.6.4-3.2
Typedeb
Namespacedebian
Namegtk+2.0
Version2.6.4-3.2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.24.33-2+deb11u1
Latest_non_vulnerable_version2.24.33-2+deb11u1
Affected_by_vulnerabilities
0
url VCID-1jyr-kac3-2ua2
vulnerability_id VCID-1jyr-kac3-2ua2
summary
The GdkPixbuf library, that is also included in GTK+ 2, contains
    vulnerabilities that could lead to a Denial of Service or the execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2976.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2976.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-2976
reference_id
reference_type
scores
0
value 0.01719
scoring_system epss
scoring_elements 0.82425
published_at 2026-04-18T12:55:00Z
1
value 0.01719
scoring_system epss
scoring_elements 0.8232
published_at 2026-04-01T12:55:00Z
2
value 0.01719
scoring_system epss
scoring_elements 0.82334
published_at 2026-04-02T12:55:00Z
3
value 0.01719
scoring_system epss
scoring_elements 0.82352
published_at 2026-04-04T12:55:00Z
4
value 0.01719
scoring_system epss
scoring_elements 0.82346
published_at 2026-04-07T12:55:00Z
5
value 0.01719
scoring_system epss
scoring_elements 0.82373
published_at 2026-04-08T12:55:00Z
6
value 0.01719
scoring_system epss
scoring_elements 0.8238
published_at 2026-04-09T12:55:00Z
7
value 0.01719
scoring_system epss
scoring_elements 0.82399
published_at 2026-04-11T12:55:00Z
8
value 0.01719
scoring_system epss
scoring_elements 0.82396
published_at 2026-04-12T12:55:00Z
9
value 0.01719
scoring_system epss
scoring_elements 0.8239
published_at 2026-04-13T12:55:00Z
10
value 0.01719
scoring_system epss
scoring_elements 0.82424
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-2976
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2976
3
reference_url http://secunia.com/advisories/17522
reference_id
reference_type
scores
url http://secunia.com/advisories/17522
4
reference_url http://secunia.com/advisories/17538
reference_id
reference_type
scores
url http://secunia.com/advisories/17538
5
reference_url http://secunia.com/advisories/17562
reference_id
reference_type
scores
url http://secunia.com/advisories/17562
6
reference_url http://secunia.com/advisories/17592
reference_id
reference_type
scores
url http://secunia.com/advisories/17592
7
reference_url http://secunia.com/advisories/17594
reference_id
reference_type
scores
url http://secunia.com/advisories/17594
8
reference_url http://secunia.com/advisories/17615
reference_id
reference_type
scores
url http://secunia.com/advisories/17615
9
reference_url http://secunia.com/advisories/17657
reference_id
reference_type
scores
url http://secunia.com/advisories/17657
10
reference_url http://secunia.com/advisories/17710
reference_id
reference_type
scores
url http://secunia.com/advisories/17710
11
reference_url http://secunia.com/advisories/17770
reference_id
reference_type
scores
url http://secunia.com/advisories/17770
12
reference_url http://secunia.com/advisories/17791
reference_id
reference_type
scores
url http://secunia.com/advisories/17791
13
reference_url http://securitytracker.com/id?1015216
reference_id
reference_type
scores
url http://securitytracker.com/id?1015216
14
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11370
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11370
15
reference_url http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf
16
reference_url http://www.debian.org/security/2005/dsa-911
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-911
17
reference_url http://www.debian.org/security/2005/dsa-913
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-913
18
reference_url http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml
19
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:214
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:214
20
reference_url http://www.novell.com/linux/security/advisories/2005_65_gtk2.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_65_gtk2.html
21
reference_url http://www.redhat.com/support/errata/RHSA-2005-810.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-810.html
22
reference_url http://www.securityfocus.com/archive/1/428052/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/428052/100/0/threaded
23
reference_url http://www.securityfocus.com/bid/15428
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15428
24
reference_url http://www.ubuntu.com/usn/usn-216-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-216-1
25
reference_url http://www.vupen.com/english/advisories/2005/2433
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2433
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617772
reference_id 1617772
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617772
27
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431
reference_id 339431
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdkpixbuf:0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:0.22:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-2976
reference_id CVE-2005-2976
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-2976
31
reference_url https://security.gentoo.org/glsa/200511-14
reference_id GLSA-200511-14
reference_type
scores
url https://security.gentoo.org/glsa/200511-14
32
reference_url https://access.redhat.com/errata/RHSA-2005:810
reference_id RHSA-2005:810
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:810
33
reference_url https://usn.ubuntu.com/216-1/
reference_id USN-216-1
reference_type
scores
url https://usn.ubuntu.com/216-1/
fixed_packages
0
url pkg:deb/debian/gtk%2B2.0@2.8.20-7
purl pkg:deb/debian/gtk%2B2.0@2.8.20-7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-drq5-6jps-skax
1
vulnerability VCID-f3g6-ambh-fkbn
2
vulnerability VCID-g4kk-jxb9-f3g5
3
vulnerability VCID-k2ph-py3f-aycu
4
vulnerability VCID-qwv5-ntpt-mbbp
5
vulnerability VCID-t3uk-tgks-eqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.8.20-7
aliases CVE-2005-2976
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1jyr-kac3-2ua2
1
url VCID-3vjs-geuw-j7h7
vulnerability_id VCID-3vjs-geuw-j7h7
summary
The GdkPixbuf library, that is also included in GTK+ 2, contains
    vulnerabilities that could lead to a Denial of Service or the execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2975.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2975.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-2975
reference_id
reference_type
scores
0
value 0.1189
scoring_system epss
scoring_elements 0.93767
published_at 2026-04-18T12:55:00Z
1
value 0.1189
scoring_system epss
scoring_elements 0.937
published_at 2026-04-01T12:55:00Z
2
value 0.1189
scoring_system epss
scoring_elements 0.9371
published_at 2026-04-02T12:55:00Z
3
value 0.1189
scoring_system epss
scoring_elements 0.9372
published_at 2026-04-04T12:55:00Z
4
value 0.1189
scoring_system epss
scoring_elements 0.93723
published_at 2026-04-07T12:55:00Z
5
value 0.1189
scoring_system epss
scoring_elements 0.93732
published_at 2026-04-08T12:55:00Z
6
value 0.1189
scoring_system epss
scoring_elements 0.93734
published_at 2026-04-09T12:55:00Z
7
value 0.1189
scoring_system epss
scoring_elements 0.93738
published_at 2026-04-13T12:55:00Z
8
value 0.1189
scoring_system epss
scoring_elements 0.9376
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-2975
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2975
3
reference_url http://secunia.com/advisories/17522
reference_id
reference_type
scores
url http://secunia.com/advisories/17522
4
reference_url http://secunia.com/advisories/17538
reference_id
reference_type
scores
url http://secunia.com/advisories/17538
5
reference_url http://secunia.com/advisories/17562
reference_id
reference_type
scores
url http://secunia.com/advisories/17562
6
reference_url http://secunia.com/advisories/17588
reference_id
reference_type
scores
url http://secunia.com/advisories/17588
7
reference_url http://secunia.com/advisories/17591
reference_id
reference_type
scores
url http://secunia.com/advisories/17591
8
reference_url http://secunia.com/advisories/17592
reference_id
reference_type
scores
url http://secunia.com/advisories/17592
9
reference_url http://secunia.com/advisories/17594
reference_id
reference_type
scores
url http://secunia.com/advisories/17594
10
reference_url http://secunia.com/advisories/17615
reference_id
reference_type
scores
url http://secunia.com/advisories/17615
11
reference_url http://secunia.com/advisories/17657
reference_id
reference_type
scores
url http://secunia.com/advisories/17657
12
reference_url http://secunia.com/advisories/17710
reference_id
reference_type
scores
url http://secunia.com/advisories/17710
13
reference_url http://secunia.com/advisories/17770
reference_id
reference_type
scores
url http://secunia.com/advisories/17770
14
reference_url http://secunia.com/advisories/17791
reference_id
reference_type
scores
url http://secunia.com/advisories/17791
15
reference_url http://securitytracker.com/id?1015216
reference_id
reference_type
scores
url http://securitytracker.com/id?1015216
16
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9697
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9697
17
reference_url http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf
18
reference_url http://www.debian.org/security/2005/dsa-911
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-911
19
reference_url http://www.debian.org/security/2005/dsa-913
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-913
20
reference_url http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml
21
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:214
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:214
22
reference_url http://www.novell.com/linux/security/advisories/2005_65_gtk2.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_65_gtk2.html
23
reference_url http://www.redhat.com/support/errata/RHSA-2005-810.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-810.html
24
reference_url http://www.redhat.com/support/errata/RHSA-2005-811.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-811.html
25
reference_url http://www.securityfocus.com/archive/1/428052/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/428052/100/0/threaded
26
reference_url http://www.securityfocus.com/bid/15429
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15429
27
reference_url http://www.ubuntu.com/usn/usn-216-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-216-1
28
reference_url http://www.vupen.com/english/advisories/2005/2433
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2433
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617771
reference_id 1617771
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617771
30
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431
reference_id 339431
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-2975
reference_id CVE-2005-2975
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2005-2975
34
reference_url https://security.gentoo.org/glsa/200511-14
reference_id GLSA-200511-14
reference_type
scores
url https://security.gentoo.org/glsa/200511-14
35
reference_url https://access.redhat.com/errata/RHSA-2005:810
reference_id RHSA-2005:810
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:810
36
reference_url https://access.redhat.com/errata/RHSA-2005:811
reference_id RHSA-2005:811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:811
37
reference_url https://usn.ubuntu.com/216-1/
reference_id USN-216-1
reference_type
scores
url https://usn.ubuntu.com/216-1/
fixed_packages
0
url pkg:deb/debian/gtk%2B2.0@2.8.20-7
purl pkg:deb/debian/gtk%2B2.0@2.8.20-7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-drq5-6jps-skax
1
vulnerability VCID-f3g6-ambh-fkbn
2
vulnerability VCID-g4kk-jxb9-f3g5
3
vulnerability VCID-k2ph-py3f-aycu
4
vulnerability VCID-qwv5-ntpt-mbbp
5
vulnerability VCID-t3uk-tgks-eqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.8.20-7
aliases CVE-2005-2975
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3vjs-geuw-j7h7
2
url VCID-7qjy-sgc4-1fc6
vulnerability_id VCID-7qjy-sgc4-1fc6
summary security flaw
references
0
reference_url http://osvdb.org/31621
reference_id
reference_type
scores
url http://osvdb.org/31621
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0010.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-0010.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-0010
reference_id
reference_type
scores
0
value 0.0093
scoring_system epss
scoring_elements 0.76135
published_at 2026-04-18T12:55:00Z
1
value 0.0093
scoring_system epss
scoring_elements 0.76029
published_at 2026-04-01T12:55:00Z
2
value 0.0093
scoring_system epss
scoring_elements 0.76032
published_at 2026-04-02T12:55:00Z
3
value 0.0093
scoring_system epss
scoring_elements 0.76065
published_at 2026-04-04T12:55:00Z
4
value 0.0093
scoring_system epss
scoring_elements 0.76045
published_at 2026-04-07T12:55:00Z
5
value 0.0093
scoring_system epss
scoring_elements 0.76078
published_at 2026-04-08T12:55:00Z
6
value 0.0093
scoring_system epss
scoring_elements 0.76092
published_at 2026-04-09T12:55:00Z
7
value 0.0093
scoring_system epss
scoring_elements 0.76117
published_at 2026-04-11T12:55:00Z
8
value 0.0093
scoring_system epss
scoring_elements 0.76093
published_at 2026-04-12T12:55:00Z
9
value 0.0093
scoring_system epss
scoring_elements 0.76091
published_at 2026-04-13T12:55:00Z
10
value 0.0093
scoring_system epss
scoring_elements 0.76131
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-0010
3
reference_url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=218932
reference_id
reference_type
scores
url https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=218932
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0010
5
reference_url http://secunia.com/advisories/23884
reference_id
reference_type
scores
url http://secunia.com/advisories/23884
6
reference_url http://secunia.com/advisories/23933
reference_id
reference_type
scores
url http://secunia.com/advisories/23933
7
reference_url http://secunia.com/advisories/23935
reference_id
reference_type
scores
url http://secunia.com/advisories/23935
8
reference_url http://secunia.com/advisories/23984
reference_id
reference_type
scores
url http://secunia.com/advisories/23984
9
reference_url http://secunia.com/advisories/24006
reference_id
reference_type
scores
url http://secunia.com/advisories/24006
10
reference_url http://secunia.com/advisories/24010
reference_id
reference_type
scores
url http://secunia.com/advisories/24010
11
reference_url http://secunia.com/advisories/24095
reference_id
reference_type
scores
url http://secunia.com/advisories/24095
12
reference_url http://securitytracker.com/id?1017552
reference_id
reference_type
scores
url http://securitytracker.com/id?1017552
13
reference_url https://issues.rpath.com/browse/RPL-984
reference_id
reference_type
scores
url https://issues.rpath.com/browse/RPL-984
14
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10325
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10325
15
reference_url https://www.debian.org/security/2007/dsa-1256
reference_id
reference_type
scores
url https://www.debian.org/security/2007/dsa-1256
16
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2007:039
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2007:039
17
reference_url http://www.novell.com/linux/security/advisories/2007_02_sr.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2007_02_sr.html
18
reference_url http://www.redhat.com/support/errata/RHSA-2007-0019.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2007-0019.html
19
reference_url http://www.securityfocus.com/bid/22209
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/22209
20
reference_url http://www.ubuntu.com/usn/usn-415-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-415-1
21
reference_url http://www.vupen.com/english/advisories/2007/0331
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2007/0331
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618260
reference_id 1618260
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618260
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/detail/CVE-2007-0010
reference_id CVE-2007-0010
reference_type
scores
0
value 2.1
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2007-0010
25
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/29520.txt
reference_id CVE-2007-0010;OSVDB-31621
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/29520.txt
26
reference_url https://www.securityfocus.com/bid/22209/info
reference_id CVE-2007-0010;OSVDB-31621
reference_type exploit
scores
url https://www.securityfocus.com/bid/22209/info
27
reference_url https://access.redhat.com/errata/RHSA-2007:0019
reference_id RHSA-2007:0019
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0019
28
reference_url https://usn.ubuntu.com/415-1/
reference_id USN-415-1
reference_type
scores
url https://usn.ubuntu.com/415-1/
fixed_packages
0
url pkg:deb/debian/gtk%2B2.0@2.8.20-7
purl pkg:deb/debian/gtk%2B2.0@2.8.20-7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-drq5-6jps-skax
1
vulnerability VCID-f3g6-ambh-fkbn
2
vulnerability VCID-g4kk-jxb9-f3g5
3
vulnerability VCID-k2ph-py3f-aycu
4
vulnerability VCID-qwv5-ntpt-mbbp
5
vulnerability VCID-t3uk-tgks-eqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.8.20-7
aliases CVE-2007-0010
risk_score 3.8
exploitability 2.0
weighted_severity 1.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7qjy-sgc4-1fc6
3
url VCID-drq5-6jps-skax
vulnerability_id VCID-drq5-6jps-skax
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4491.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4491.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4491
reference_id
reference_type
scores
0
value 0.04296
scoring_system epss
scoring_elements 0.88882
published_at 2026-04-18T12:55:00Z
1
value 0.04296
scoring_system epss
scoring_elements 0.88815
published_at 2026-04-01T12:55:00Z
2
value 0.04296
scoring_system epss
scoring_elements 0.88871
published_at 2026-04-13T12:55:00Z
3
value 0.04296
scoring_system epss
scoring_elements 0.88884
published_at 2026-04-16T12:55:00Z
4
value 0.04296
scoring_system epss
scoring_elements 0.88823
published_at 2026-04-02T12:55:00Z
5
value 0.04296
scoring_system epss
scoring_elements 0.88839
published_at 2026-04-04T12:55:00Z
6
value 0.04296
scoring_system epss
scoring_elements 0.88841
published_at 2026-04-07T12:55:00Z
7
value 0.04296
scoring_system epss
scoring_elements 0.88859
published_at 2026-04-08T12:55:00Z
8
value 0.04296
scoring_system epss
scoring_elements 0.88864
published_at 2026-04-09T12:55:00Z
9
value 0.04296
scoring_system epss
scoring_elements 0.88876
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4491
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1252290
reference_id 1252290
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1252290
5
reference_url https://security.gentoo.org/glsa/201512-05
reference_id GLSA-201512-05
reference_type
scores
url https://security.gentoo.org/glsa/201512-05
6
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-88
reference_id mfsa2015-88
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-88
8
reference_url https://access.redhat.com/errata/RHSA-2015:1586
reference_id RHSA-2015:1586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1586
9
reference_url https://access.redhat.com/errata/RHSA-2015:1682
reference_id RHSA-2015:1682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1682
10
reference_url https://access.redhat.com/errata/RHSA-2015:1694
reference_id RHSA-2015:1694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1694
11
reference_url https://usn.ubuntu.com/2702-1/
reference_id USN-2702-1
reference_type
scores
url https://usn.ubuntu.com/2702-1/
12
reference_url https://usn.ubuntu.com/2712-1/
reference_id USN-2712-1
reference_type
scores
url https://usn.ubuntu.com/2712-1/
13
reference_url https://usn.ubuntu.com/2722-1/
reference_id USN-2722-1
reference_type
scores
url https://usn.ubuntu.com/2722-1/
fixed_packages
0
url pkg:deb/debian/gtk%2B2.0@2.24.10-2
purl pkg:deb/debian/gtk%2B2.0@2.24.10-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-g4kk-jxb9-f3g5
1
vulnerability VCID-t3uk-tgks-eqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.10-2
aliases CVE-2015-4491
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-drq5-6jps-skax
4
url VCID-ecuv-xp49-5yeh
vulnerability_id VCID-ecuv-xp49-5yeh
summary
The GdkPixbuf library, that is also included in GTK+ 2, contains
    vulnerabilities that could lead to a Denial of Service or the execution of
    arbitrary code.
references
0
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.8/SCOSA-2006.8.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.8/SCOSA-2006.8.txt
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3186.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3186.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3186
reference_id
reference_type
scores
0
value 0.02224
scoring_system epss
scoring_elements 0.84533
published_at 2026-04-18T12:55:00Z
1
value 0.02224
scoring_system epss
scoring_elements 0.84439
published_at 2026-04-01T12:55:00Z
2
value 0.02224
scoring_system epss
scoring_elements 0.84454
published_at 2026-04-02T12:55:00Z
3
value 0.02224
scoring_system epss
scoring_elements 0.84474
published_at 2026-04-04T12:55:00Z
4
value 0.02224
scoring_system epss
scoring_elements 0.84476
published_at 2026-04-07T12:55:00Z
5
value 0.02224
scoring_system epss
scoring_elements 0.84497
published_at 2026-04-08T12:55:00Z
6
value 0.02224
scoring_system epss
scoring_elements 0.84503
published_at 2026-04-09T12:55:00Z
7
value 0.02224
scoring_system epss
scoring_elements 0.84521
published_at 2026-04-11T12:55:00Z
8
value 0.02224
scoring_system epss
scoring_elements 0.84516
published_at 2026-04-12T12:55:00Z
9
value 0.02224
scoring_system epss
scoring_elements 0.84512
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3186
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3186
4
reference_url http://secunia.com/advisories/17522
reference_id
reference_type
scores
url http://secunia.com/advisories/17522
5
reference_url http://secunia.com/advisories/17538
reference_id
reference_type
scores
url http://secunia.com/advisories/17538
6
reference_url http://secunia.com/advisories/17562
reference_id
reference_type
scores
url http://secunia.com/advisories/17562
7
reference_url http://secunia.com/advisories/17588
reference_id
reference_type
scores
url http://secunia.com/advisories/17588
8
reference_url http://secunia.com/advisories/17591
reference_id
reference_type
scores
url http://secunia.com/advisories/17591
9
reference_url http://secunia.com/advisories/17592
reference_id
reference_type
scores
url http://secunia.com/advisories/17592
10
reference_url http://secunia.com/advisories/17594
reference_id
reference_type
scores
url http://secunia.com/advisories/17594
11
reference_url http://secunia.com/advisories/17615
reference_id
reference_type
scores
url http://secunia.com/advisories/17615
12
reference_url http://secunia.com/advisories/17657
reference_id
reference_type
scores
url http://secunia.com/advisories/17657
13
reference_url http://secunia.com/advisories/17710
reference_id
reference_type
scores
url http://secunia.com/advisories/17710
14
reference_url http://secunia.com/advisories/17770
reference_id
reference_type
scores
url http://secunia.com/advisories/17770
15
reference_url http://secunia.com/advisories/17791
reference_id
reference_type
scores
url http://secunia.com/advisories/17791
16
reference_url http://secunia.com/advisories/18509
reference_id
reference_type
scores
url http://secunia.com/advisories/18509
17
reference_url http://securityreason.com/securityalert/188
reference_id
reference_type
scores
url http://securityreason.com/securityalert/188
18
reference_url http://securitytracker.com/id?1015216
reference_id
reference_type
scores
url http://securitytracker.com/id?1015216
19
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9503
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9503
20
reference_url http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf
21
reference_url http://www.debian.org/security/2005/dsa-911
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-911
22
reference_url http://www.debian.org/security/2005/dsa-913
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-913
23
reference_url http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml
24
reference_url http://www.idefense.com/application/poi/display?id=339&type=vulnerabilities
reference_id
reference_type
scores
url http://www.idefense.com/application/poi/display?id=339&type=vulnerabilities
25
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:214
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:214
26
reference_url http://www.novell.com/linux/security/advisories/2005_65_gtk2.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_65_gtk2.html
27
reference_url http://www.redhat.com/support/errata/RHSA-2005-810.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-810.html
28
reference_url http://www.redhat.com/support/errata/RHSA-2005-811.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-811.html
29
reference_url http://www.securityfocus.com/archive/1/428052/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/428052/100/0/threaded
30
reference_url http://www.securityfocus.com/bid/15435
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15435
31
reference_url http://www.ubuntu.com/usn/usn-216-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-216-1
32
reference_url http://www.vupen.com/english/advisories/2005/2433
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2433
33
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617795
reference_id 1617795
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617795
34
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431
reference_id 339431
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gtk:gtk\+:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gtk:gtk\+:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gtk:gtk\+:2.4.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3186
reference_id CVE-2005-3186
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-3186
38
reference_url https://security.gentoo.org/glsa/200511-14
reference_id GLSA-200511-14
reference_type
scores
url https://security.gentoo.org/glsa/200511-14
39
reference_url https://access.redhat.com/errata/RHSA-2005:810
reference_id RHSA-2005:810
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:810
40
reference_url https://access.redhat.com/errata/RHSA-2005:811
reference_id RHSA-2005:811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:811
41
reference_url https://usn.ubuntu.com/216-1/
reference_id USN-216-1
reference_type
scores
url https://usn.ubuntu.com/216-1/
fixed_packages
0
url pkg:deb/debian/gtk%2B2.0@2.8.20-7
purl pkg:deb/debian/gtk%2B2.0@2.8.20-7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-drq5-6jps-skax
1
vulnerability VCID-f3g6-ambh-fkbn
2
vulnerability VCID-g4kk-jxb9-f3g5
3
vulnerability VCID-k2ph-py3f-aycu
4
vulnerability VCID-qwv5-ntpt-mbbp
5
vulnerability VCID-t3uk-tgks-eqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.8.20-7
aliases CVE-2005-3186
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ecuv-xp49-5yeh
5
url VCID-f3g6-ambh-fkbn
vulnerability_id VCID-f3g6-ambh-fkbn
summary
This GLSA contains notification of vulnerabilities found in several
    Gentoo packages which have been fixed prior to January 1, 2011. The worst
    of these vulnerabilities could lead to local privilege escalation and
    remote code execution. Please see the package list and CVE identifiers
    below for more information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0732.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0732.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0732
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.1246
published_at 2026-04-01T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12564
published_at 2026-04-02T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12605
published_at 2026-04-04T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12414
published_at 2026-04-07T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12495
published_at 2026-04-08T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12547
published_at 2026-04-09T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12517
published_at 2026-04-11T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12478
published_at 2026-04-12T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12438
published_at 2026-04-13T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12341
published_at 2026-04-16T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.12343
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0732
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0732
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=565527
reference_id 565527
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=565527
4
reference_url https://security.gentoo.org/glsa/201412-08
reference_id GLSA-201412-08
reference_type
scores
url https://security.gentoo.org/glsa/201412-08
fixed_packages
0
url pkg:deb/debian/gtk%2B2.0@2.20.1-2
purl pkg:deb/debian/gtk%2B2.0@2.20.1-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-drq5-6jps-skax
1
vulnerability VCID-g4kk-jxb9-f3g5
2
vulnerability VCID-k2ph-py3f-aycu
3
vulnerability VCID-qwv5-ntpt-mbbp
4
vulnerability VCID-t3uk-tgks-eqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.20.1-2
aliases CVE-2010-0732
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f3g6-ambh-fkbn
6
url VCID-g4kk-jxb9-f3g5
vulnerability_id VCID-g4kk-jxb9-f3g5
summary gtk3: Integer overflow in image handling
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2016-03/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-03/msg00010.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7447.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7447.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-7447
reference_id
reference_type
scores
0
value 0.03846
scoring_system epss
scoring_elements 0.88206
published_at 2026-04-18T12:55:00Z
1
value 0.03846
scoring_system epss
scoring_elements 0.88193
published_at 2026-04-13T12:55:00Z
2
value 0.03846
scoring_system epss
scoring_elements 0.88207
published_at 2026-04-16T12:55:00Z
3
value 0.03846
scoring_system epss
scoring_elements 0.88133
published_at 2026-04-01T12:55:00Z
4
value 0.03846
scoring_system epss
scoring_elements 0.88142
published_at 2026-04-02T12:55:00Z
5
value 0.03846
scoring_system epss
scoring_elements 0.88158
published_at 2026-04-04T12:55:00Z
6
value 0.03846
scoring_system epss
scoring_elements 0.88164
published_at 2026-04-07T12:55:00Z
7
value 0.03846
scoring_system epss
scoring_elements 0.88184
published_at 2026-04-08T12:55:00Z
8
value 0.03846
scoring_system epss
scoring_elements 0.88189
published_at 2026-04-09T12:55:00Z
9
value 0.03846
scoring_system epss
scoring_elements 0.88199
published_at 2026-04-11T12:55:00Z
10
value 0.03846
scoring_system epss
scoring_elements 0.88192
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-7447
3
reference_url https://bugs.launchpad.net/ubuntu/+source/gtk+2.0/+bug/1540811
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/+source/gtk+2.0/+bug/1540811
4
reference_url https://bugzilla.gnome.org/show_bug.cgi?id=703220
reference_id
reference_type
scores
url https://bugzilla.gnome.org/show_bug.cgi?id=703220
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7447
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://git.gnome.org/browse/gtk+/commit?id=894b1ae76a32720f4bb3d39cf460402e3ce331d6
reference_id
reference_type
scores
url https://git.gnome.org/browse/gtk+/commit?id=894b1ae76a32720f4bb3d39cf460402e3ce331d6
8
reference_url https://git.gnome.org/browse/gtk+/tree/NEWS
reference_id
reference_type
scores
url https://git.gnome.org/browse/gtk+/tree/NEWS
9
reference_url https://github.com/mate-desktop/eom/issues/93
reference_id
reference_type
scores
url https://github.com/mate-desktop/eom/issues/93
10
reference_url http://www.openwall.com/lists/oss-security/2016/02/10/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/02/10/2
11
reference_url http://www.openwall.com/lists/oss-security/2016/02/10/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/02/10/6
12
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
13
reference_url http://www.securityfocus.com/bid/83239
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/83239
14
reference_url http://www.ubuntu.com/usn/USN-2898-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2898-1
15
reference_url http://www.ubuntu.com/usn/USN-2898-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2898-2
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1306681
reference_id 1306681
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1306681
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799275
reference_id 799275
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799275
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818090
reference_id 818090
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818090
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:samsung:x14j_firmware:t-ms14jakucb-1102.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:samsung:x14j_firmware:t-ms14jakucb-1102.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:samsung:x14j_firmware:t-ms14jakucb-1102.5:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-7447
reference_id CVE-2013-7447
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2013-7447
24
reference_url https://usn.ubuntu.com/2898-1/
reference_id USN-2898-1
reference_type
scores
url https://usn.ubuntu.com/2898-1/
25
reference_url https://usn.ubuntu.com/2898-2/
reference_id USN-2898-2
reference_type
scores
url https://usn.ubuntu.com/2898-2/
fixed_packages
0
url pkg:deb/debian/gtk%2B2.0@2.24.31-2
purl pkg:deb/debian/gtk%2B2.0@2.24.31-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-t3uk-tgks-eqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.31-2
aliases CVE-2013-7447
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g4kk-jxb9-f3g5
7
url VCID-k2ph-py3f-aycu
vulnerability_id VCID-k2ph-py3f-aycu
summary
Multiple buffer overflow vulnerabilities in gdk-pixbuf may allow
    remote attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url http://ftp.gnome.org/pub/gnome/sources/gdk-pixbuf/2.32/gdk-pixbuf-2.32.0.news
reference_id
reference_type
scores
url http://ftp.gnome.org/pub/gnome/sources/gdk-pixbuf/2.32/gdk-pixbuf-2.32.0.news
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7673.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7673.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7673
reference_id
reference_type
scores
0
value 0.02374
scoring_system epss
scoring_elements 0.8499
published_at 2026-04-18T12:55:00Z
1
value 0.02374
scoring_system epss
scoring_elements 0.84889
published_at 2026-04-01T12:55:00Z
2
value 0.02374
scoring_system epss
scoring_elements 0.84905
published_at 2026-04-02T12:55:00Z
3
value 0.02374
scoring_system epss
scoring_elements 0.84923
published_at 2026-04-04T12:55:00Z
4
value 0.02374
scoring_system epss
scoring_elements 0.84927
published_at 2026-04-07T12:55:00Z
5
value 0.02374
scoring_system epss
scoring_elements 0.8495
published_at 2026-04-08T12:55:00Z
6
value 0.02374
scoring_system epss
scoring_elements 0.84957
published_at 2026-04-09T12:55:00Z
7
value 0.02374
scoring_system epss
scoring_elements 0.84973
published_at 2026-04-11T12:55:00Z
8
value 0.02374
scoring_system epss
scoring_elements 0.84972
published_at 2026-04-12T12:55:00Z
9
value 0.02374
scoring_system epss
scoring_elements 0.84967
published_at 2026-04-13T12:55:00Z
10
value 0.02374
scoring_system epss
scoring_elements 0.84988
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7673
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674
7
reference_url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=19f9685dbff7d1f929c61cf99188df917a18811d
reference_id
reference_type
scores
url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=19f9685dbff7d1f929c61cf99188df917a18811d
8
reference_url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=6ddca835100107e6b5841ce9d56074f6d98c387e
reference_id
reference_type
scores
url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=6ddca835100107e6b5841ce9d56074f6d98c387e
9
reference_url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=edf6fb8d856574bc3bb3a703037f56533229267c
reference_id
reference_type
scores
url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=edf6fb8d856574bc3bb3a703037f56533229267c
10
reference_url http://www.debian.org/security/2015/dsa-3378
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3378
11
reference_url http://www.openwall.com/lists/oss-security/2015/10/01/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/10/01/3
12
reference_url http://www.openwall.com/lists/oss-security/2015/10/02/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/10/02/9
13
reference_url http://www.securityfocus.com/bid/76953
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/76953
14
reference_url http://www.ubuntu.com/usn/USN-2767-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2767-1
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1261836
reference_id 1261836
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1261836
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7673
reference_id CVE-2015-7673
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7673
19
reference_url https://security.gentoo.org/glsa/201512-05
reference_id GLSA-201512-05
reference_type
scores
url https://security.gentoo.org/glsa/201512-05
20
reference_url https://usn.ubuntu.com/2767-1/
reference_id USN-2767-1
reference_type
scores
url https://usn.ubuntu.com/2767-1/
fixed_packages
0
url pkg:deb/debian/gtk%2B2.0@2.24.10-2
purl pkg:deb/debian/gtk%2B2.0@2.24.10-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-g4kk-jxb9-f3g5
1
vulnerability VCID-t3uk-tgks-eqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.10-2
aliases CVE-2015-7673
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k2ph-py3f-aycu
8
url VCID-qwv5-ntpt-mbbp
vulnerability_id VCID-qwv5-ntpt-mbbp
summary
Multiple buffer overflow vulnerabilities in gdk-pixbuf may allow
    remote attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url http://ftp.gnome.org/pub/gnome/sources/gdk-pixbuf/2.32/gdk-pixbuf-2.32.1.news
reference_id
reference_type
scores
url http://ftp.gnome.org/pub/gnome/sources/gdk-pixbuf/2.32/gdk-pixbuf-2.32.1.news
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7674.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7674.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7674
reference_id
reference_type
scores
0
value 0.0155
scoring_system epss
scoring_elements 0.81451
published_at 2026-04-18T12:55:00Z
1
value 0.0155
scoring_system epss
scoring_elements 0.81348
published_at 2026-04-01T12:55:00Z
2
value 0.0155
scoring_system epss
scoring_elements 0.81358
published_at 2026-04-02T12:55:00Z
3
value 0.0155
scoring_system epss
scoring_elements 0.8138
published_at 2026-04-04T12:55:00Z
4
value 0.0155
scoring_system epss
scoring_elements 0.81378
published_at 2026-04-07T12:55:00Z
5
value 0.0155
scoring_system epss
scoring_elements 0.81406
published_at 2026-04-08T12:55:00Z
6
value 0.0155
scoring_system epss
scoring_elements 0.8141
published_at 2026-04-09T12:55:00Z
7
value 0.0155
scoring_system epss
scoring_elements 0.81432
published_at 2026-04-11T12:55:00Z
8
value 0.0155
scoring_system epss
scoring_elements 0.8142
published_at 2026-04-12T12:55:00Z
9
value 0.0155
scoring_system epss
scoring_elements 0.81413
published_at 2026-04-13T12:55:00Z
10
value 0.0155
scoring_system epss
scoring_elements 0.8145
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7674
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674
7
reference_url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=e9a5704edaa9aee9498f1fbf6e1b70fcce2e55aa
reference_id
reference_type
scores
url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=e9a5704edaa9aee9498f1fbf6e1b70fcce2e55aa
8
reference_url http://www.debian.org/security/2015/dsa-3378
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3378
9
reference_url http://www.openwall.com/lists/oss-security/2015/10/01/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/10/01/4
10
reference_url http://www.openwall.com/lists/oss-security/2015/10/01/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/10/01/7
11
reference_url http://www.openwall.com/lists/oss-security/2015/10/02/10
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/10/02/10
12
reference_url http://www.openwall.com/lists/oss-security/2015/10/05/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/10/05/7
13
reference_url http://www.securityfocus.com/bid/76955
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/76955
14
reference_url http://www.ubuntu.com/usn/USN-2767-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2767-1
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1268249
reference_id 1268249
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1268249
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7674
reference_id CVE-2015-7674
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7674
22
reference_url https://security.gentoo.org/glsa/201512-05
reference_id GLSA-201512-05
reference_type
scores
url https://security.gentoo.org/glsa/201512-05
23
reference_url https://usn.ubuntu.com/2767-1/
reference_id USN-2767-1
reference_type
scores
url https://usn.ubuntu.com/2767-1/
fixed_packages
0
url pkg:deb/debian/gtk%2B2.0@2.24.10-2
purl pkg:deb/debian/gtk%2B2.0@2.24.10-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-g4kk-jxb9-f3g5
1
vulnerability VCID-t3uk-tgks-eqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.10-2
aliases CVE-2015-7674
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qwv5-ntpt-mbbp
9
url VCID-t3uk-tgks-eqgr
vulnerability_id VCID-t3uk-tgks-eqgr
summary A vulnerability has been discovered in Gtk+, which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6655.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6655.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6655
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15772
published_at 2026-04-18T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15818
published_at 2026-04-07T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.15904
published_at 2026-04-08T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15965
published_at 2026-04-09T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15945
published_at 2026-04-11T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15906
published_at 2026-04-12T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.15838
published_at 2026-04-13T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.15761
published_at 2026-04-16T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15955
published_at 2026-04-02T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.16019
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6655
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6655
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.openwall.com/lists/oss-security/2024/09/09/1
reference_id 1
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-16T18:07:04Z/
url https://www.openwall.com/lists/oss-security/2024/09/09/1
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297098
reference_id 2297098
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-16T18:07:04Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2297098
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
15
reference_url https://access.redhat.com/security/cve/CVE-2024-6655
reference_id CVE-2024-6655
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-16T18:07:04Z/
url https://access.redhat.com/security/cve/CVE-2024-6655
16
reference_url https://gitlab.gnome.org/GNOME/gtk/-/merge_requests/7361/diffs?commit_id=3bbf0b6176d42836d23c36a6ac410e807ec0a7a7#diff-content-e3fbe6480add9420b69f82374fb26ccac2c015a0
reference_id diffs?commit_id=3bbf0b6176d42836d23c36a6ac410e807ec0a7a7#diff-content-e3fbe6480add9420b69f82374fb26ccac2c015a0
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-16T18:07:04Z/
url https://gitlab.gnome.org/GNOME/gtk/-/merge_requests/7361/diffs?commit_id=3bbf0b6176d42836d23c36a6ac410e807ec0a7a7#diff-content-e3fbe6480add9420b69f82374fb26ccac2c015a0
17
reference_url https://security.gentoo.org/glsa/202506-05
reference_id GLSA-202506-05
reference_type
scores
url https://security.gentoo.org/glsa/202506-05
18
reference_url https://access.redhat.com/errata/RHSA-2024:6963
reference_id RHSA-2024:6963
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-16T18:07:04Z/
url https://access.redhat.com/errata/RHSA-2024:6963
19
reference_url https://access.redhat.com/errata/RHSA-2024:9184
reference_id RHSA-2024:9184
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-16T18:07:04Z/
url https://access.redhat.com/errata/RHSA-2024:9184
20
reference_url https://usn.ubuntu.com/6899-1/
reference_id USN-6899-1
reference_type
scores
url https://usn.ubuntu.com/6899-1/
fixed_packages
0
url pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1
purl pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb11u1
aliases CVE-2024-6655
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t3uk-tgks-eqgr
Fixing_vulnerabilities
0
url VCID-e4t8-whcc-r7c4
vulnerability_id VCID-e4t8-whcc-r7c4
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0783.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0783.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0783
reference_id
reference_type
scores
0
value 0.27699
scoring_system epss
scoring_elements 0.96413
published_at 2026-04-01T12:55:00Z
1
value 0.27699
scoring_system epss
scoring_elements 0.9642
published_at 2026-04-02T12:55:00Z
2
value 0.27699
scoring_system epss
scoring_elements 0.96424
published_at 2026-04-04T12:55:00Z
3
value 0.27699
scoring_system epss
scoring_elements 0.96427
published_at 2026-04-07T12:55:00Z
4
value 0.27699
scoring_system epss
scoring_elements 0.96436
published_at 2026-04-08T12:55:00Z
5
value 0.27699
scoring_system epss
scoring_elements 0.96439
published_at 2026-04-09T12:55:00Z
6
value 0.27699
scoring_system epss
scoring_elements 0.96443
published_at 2026-04-11T12:55:00Z
7
value 0.27699
scoring_system epss
scoring_elements 0.96444
published_at 2026-04-12T12:55:00Z
8
value 0.27699
scoring_system epss
scoring_elements 0.96447
published_at 2026-04-13T12:55:00Z
9
value 0.27699
scoring_system epss
scoring_elements 0.96454
published_at 2026-04-16T12:55:00Z
10
value 0.27699
scoring_system epss
scoring_elements 0.96458
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0783
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0783
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617284
reference_id 1617284
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617284
4
reference_url https://access.redhat.com/errata/RHSA-2004:447
reference_id RHSA-2004:447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:447
5
reference_url https://access.redhat.com/errata/RHSA-2004:466
reference_id RHSA-2004:466
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:466
fixed_packages
0
url pkg:deb/debian/gtk%2B2.0@2.6.4-3.2
purl pkg:deb/debian/gtk%2B2.0@2.6.4-3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1jyr-kac3-2ua2
1
vulnerability VCID-3vjs-geuw-j7h7
2
vulnerability VCID-7qjy-sgc4-1fc6
3
vulnerability VCID-drq5-6jps-skax
4
vulnerability VCID-ecuv-xp49-5yeh
5
vulnerability VCID-f3g6-ambh-fkbn
6
vulnerability VCID-g4kk-jxb9-f3g5
7
vulnerability VCID-k2ph-py3f-aycu
8
vulnerability VCID-qwv5-ntpt-mbbp
9
vulnerability VCID-t3uk-tgks-eqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.6.4-3.2
aliases CVE-2004-0783
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e4t8-whcc-r7c4
1
url VCID-epbu-y9uy-83bs
vulnerability_id VCID-epbu-y9uy-83bs
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0782.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0782.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0782
reference_id
reference_type
scores
0
value 0.30045
scoring_system epss
scoring_elements 0.96626
published_at 2026-04-01T12:55:00Z
1
value 0.30045
scoring_system epss
scoring_elements 0.96635
published_at 2026-04-02T12:55:00Z
2
value 0.30045
scoring_system epss
scoring_elements 0.9664
published_at 2026-04-04T12:55:00Z
3
value 0.30045
scoring_system epss
scoring_elements 0.96644
published_at 2026-04-07T12:55:00Z
4
value 0.30045
scoring_system epss
scoring_elements 0.96652
published_at 2026-04-08T12:55:00Z
5
value 0.30045
scoring_system epss
scoring_elements 0.96654
published_at 2026-04-09T12:55:00Z
6
value 0.30045
scoring_system epss
scoring_elements 0.96656
published_at 2026-04-12T12:55:00Z
7
value 0.30045
scoring_system epss
scoring_elements 0.96659
published_at 2026-04-13T12:55:00Z
8
value 0.30045
scoring_system epss
scoring_elements 0.96666
published_at 2026-04-16T12:55:00Z
9
value 0.30045
scoring_system epss
scoring_elements 0.9667
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0782
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0782
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617283
reference_id 1617283
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617283
4
reference_url https://access.redhat.com/errata/RHSA-2004:447
reference_id RHSA-2004:447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:447
5
reference_url https://access.redhat.com/errata/RHSA-2004:466
reference_id RHSA-2004:466
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:466
fixed_packages
0
url pkg:deb/debian/gtk%2B2.0@2.6.4-3.2
purl pkg:deb/debian/gtk%2B2.0@2.6.4-3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1jyr-kac3-2ua2
1
vulnerability VCID-3vjs-geuw-j7h7
2
vulnerability VCID-7qjy-sgc4-1fc6
3
vulnerability VCID-drq5-6jps-skax
4
vulnerability VCID-ecuv-xp49-5yeh
5
vulnerability VCID-f3g6-ambh-fkbn
6
vulnerability VCID-g4kk-jxb9-f3g5
7
vulnerability VCID-k2ph-py3f-aycu
8
vulnerability VCID-qwv5-ntpt-mbbp
9
vulnerability VCID-t3uk-tgks-eqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.6.4-3.2
aliases CVE-2004-0782
risk_score 0.1
exploitability 0.5
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-epbu-y9uy-83bs
2
url VCID-juz2-dgbr-4bd7
vulnerability_id VCID-juz2-dgbr-4bd7
summary security flaw
references
0
reference_url http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000958
reference_id
reference_type
scores
url http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000958
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0891.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0891.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-0891
reference_id
reference_type
scores
0
value 0.02026
scoring_system epss
scoring_elements 0.83816
published_at 2026-04-18T12:55:00Z
1
value 0.02026
scoring_system epss
scoring_elements 0.83782
published_at 2026-04-13T12:55:00Z
2
value 0.02026
scoring_system epss
scoring_elements 0.83815
published_at 2026-04-16T12:55:00Z
3
value 0.02026
scoring_system epss
scoring_elements 0.83716
published_at 2026-04-01T12:55:00Z
4
value 0.02026
scoring_system epss
scoring_elements 0.83729
published_at 2026-04-02T12:55:00Z
5
value 0.02026
scoring_system epss
scoring_elements 0.83743
published_at 2026-04-04T12:55:00Z
6
value 0.02026
scoring_system epss
scoring_elements 0.83746
published_at 2026-04-07T12:55:00Z
7
value 0.02026
scoring_system epss
scoring_elements 0.8377
published_at 2026-04-08T12:55:00Z
8
value 0.02026
scoring_system epss
scoring_elements 0.83776
published_at 2026-04-09T12:55:00Z
9
value 0.02026
scoring_system epss
scoring_elements 0.83792
published_at 2026-04-11T12:55:00Z
10
value 0.02026
scoring_system epss
scoring_elements 0.83786
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-0891
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0891
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0891
4
reference_url http://secunia.com/advisories/17657
reference_id
reference_type
scores
url http://secunia.com/advisories/17657
5
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9710
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9710
6
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:214
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:214
7
reference_url http://www.redhat.com/support/errata/RHSA-2005-343.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-343.html
8
reference_url http://www.redhat.com/support/errata/RHSA-2005-344.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-344.html
9
reference_url http://www.securityfocus.com/archive/1/419771/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/419771/100/0/threaded
10
reference_url http://www.securityfocus.com/bid/12950
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/12950
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617587
reference_id 1617587
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617587
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-0891
reference_id CVE-2005-0891
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2005-0891
14
reference_url https://access.redhat.com/errata/RHSA-2005:343
reference_id RHSA-2005:343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:343
15
reference_url https://access.redhat.com/errata/RHSA-2005:344
reference_id RHSA-2005:344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:344
16
reference_url https://usn.ubuntu.com/108-1/
reference_id USN-108-1
reference_type
scores
url https://usn.ubuntu.com/108-1/
fixed_packages
0
url pkg:deb/debian/gtk%2B2.0@2.6.4-3.2
purl pkg:deb/debian/gtk%2B2.0@2.6.4-3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1jyr-kac3-2ua2
1
vulnerability VCID-3vjs-geuw-j7h7
2
vulnerability VCID-7qjy-sgc4-1fc6
3
vulnerability VCID-drq5-6jps-skax
4
vulnerability VCID-ecuv-xp49-5yeh
5
vulnerability VCID-f3g6-ambh-fkbn
6
vulnerability VCID-g4kk-jxb9-f3g5
7
vulnerability VCID-k2ph-py3f-aycu
8
vulnerability VCID-qwv5-ntpt-mbbp
9
vulnerability VCID-t3uk-tgks-eqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.6.4-3.2
aliases CVE-2005-0891
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-juz2-dgbr-4bd7
3
url VCID-y1dx-tg6t-aqe4
vulnerability_id VCID-y1dx-tg6t-aqe4
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0788.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0788.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0788
reference_id
reference_type
scores
0
value 0.1293
scoring_system epss
scoring_elements 0.94022
published_at 2026-04-01T12:55:00Z
1
value 0.1293
scoring_system epss
scoring_elements 0.94032
published_at 2026-04-02T12:55:00Z
2
value 0.1293
scoring_system epss
scoring_elements 0.94043
published_at 2026-04-04T12:55:00Z
3
value 0.1293
scoring_system epss
scoring_elements 0.94046
published_at 2026-04-07T12:55:00Z
4
value 0.1293
scoring_system epss
scoring_elements 0.94054
published_at 2026-04-08T12:55:00Z
5
value 0.1293
scoring_system epss
scoring_elements 0.94058
published_at 2026-04-09T12:55:00Z
6
value 0.1293
scoring_system epss
scoring_elements 0.94063
published_at 2026-04-13T12:55:00Z
7
value 0.1293
scoring_system epss
scoring_elements 0.94079
published_at 2026-04-16T12:55:00Z
8
value 0.1293
scoring_system epss
scoring_elements 0.94083
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0788
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0788
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617290
reference_id 1617290
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617290
4
reference_url https://access.redhat.com/errata/RHSA-2004:447
reference_id RHSA-2004:447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:447
5
reference_url https://access.redhat.com/errata/RHSA-2004:466
reference_id RHSA-2004:466
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:466
fixed_packages
0
url pkg:deb/debian/gtk%2B2.0@2.6.4-3.2
purl pkg:deb/debian/gtk%2B2.0@2.6.4-3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1jyr-kac3-2ua2
1
vulnerability VCID-3vjs-geuw-j7h7
2
vulnerability VCID-7qjy-sgc4-1fc6
3
vulnerability VCID-drq5-6jps-skax
4
vulnerability VCID-ecuv-xp49-5yeh
5
vulnerability VCID-f3g6-ambh-fkbn
6
vulnerability VCID-g4kk-jxb9-f3g5
7
vulnerability VCID-k2ph-py3f-aycu
8
vulnerability VCID-qwv5-ntpt-mbbp
9
vulnerability VCID-t3uk-tgks-eqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.6.4-3.2
aliases CVE-2004-0788
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y1dx-tg6t-aqe4
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.6.4-3.2