Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/gtk%2B2.0@2.12.12-1~lenny2
Typedeb
Namespacedebian
Namegtk+2.0
Version2.12.12-1~lenny2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.24.33-2+deb11u1
Latest_non_vulnerable_version2.24.33-2+deb11u1
Affected_by_vulnerabilities
0
url VCID-drq5-6jps-skax
vulnerability_id VCID-drq5-6jps-skax
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4491.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4491.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4491
reference_id
reference_type
scores
0
value 0.04296
scoring_system epss
scoring_elements 0.88884
published_at 2026-04-16T12:55:00Z
1
value 0.04296
scoring_system epss
scoring_elements 0.88815
published_at 2026-04-01T12:55:00Z
2
value 0.04296
scoring_system epss
scoring_elements 0.88876
published_at 2026-04-11T12:55:00Z
3
value 0.04296
scoring_system epss
scoring_elements 0.88871
published_at 2026-04-13T12:55:00Z
4
value 0.04296
scoring_system epss
scoring_elements 0.88823
published_at 2026-04-02T12:55:00Z
5
value 0.04296
scoring_system epss
scoring_elements 0.88839
published_at 2026-04-04T12:55:00Z
6
value 0.04296
scoring_system epss
scoring_elements 0.88841
published_at 2026-04-07T12:55:00Z
7
value 0.04296
scoring_system epss
scoring_elements 0.88859
published_at 2026-04-08T12:55:00Z
8
value 0.04296
scoring_system epss
scoring_elements 0.88864
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4491
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1252290
reference_id 1252290
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1252290
5
reference_url https://security.gentoo.org/glsa/201512-05
reference_id GLSA-201512-05
reference_type
scores
url https://security.gentoo.org/glsa/201512-05
6
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-88
reference_id mfsa2015-88
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-88
8
reference_url https://access.redhat.com/errata/RHSA-2015:1586
reference_id RHSA-2015:1586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1586
9
reference_url https://access.redhat.com/errata/RHSA-2015:1682
reference_id RHSA-2015:1682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1682
10
reference_url https://access.redhat.com/errata/RHSA-2015:1694
reference_id RHSA-2015:1694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1694
11
reference_url https://usn.ubuntu.com/2702-1/
reference_id USN-2702-1
reference_type
scores
url https://usn.ubuntu.com/2702-1/
12
reference_url https://usn.ubuntu.com/2712-1/
reference_id USN-2712-1
reference_type
scores
url https://usn.ubuntu.com/2712-1/
13
reference_url https://usn.ubuntu.com/2722-1/
reference_id USN-2722-1
reference_type
scores
url https://usn.ubuntu.com/2722-1/
fixed_packages
0
url pkg:deb/debian/gtk%2B2.0@2.24.10-2
purl pkg:deb/debian/gtk%2B2.0@2.24.10-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-g4kk-jxb9-f3g5
1
vulnerability VCID-t3uk-tgks-eqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.10-2
aliases CVE-2015-4491
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-drq5-6jps-skax
1
url VCID-f3g6-ambh-fkbn
vulnerability_id VCID-f3g6-ambh-fkbn
summary
This GLSA contains notification of vulnerabilities found in several
    Gentoo packages which have been fixed prior to January 1, 2011. The worst
    of these vulnerabilities could lead to local privilege escalation and
    remote code execution. Please see the package list and CVE identifiers
    below for more information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0732.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0732.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-0732
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.1246
published_at 2026-04-01T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12564
published_at 2026-04-02T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12605
published_at 2026-04-04T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12414
published_at 2026-04-07T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12495
published_at 2026-04-08T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12547
published_at 2026-04-09T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12517
published_at 2026-04-11T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12478
published_at 2026-04-12T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12438
published_at 2026-04-13T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12341
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-0732
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0732
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=565527
reference_id 565527
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=565527
4
reference_url https://security.gentoo.org/glsa/201412-08
reference_id GLSA-201412-08
reference_type
scores
url https://security.gentoo.org/glsa/201412-08
fixed_packages
0
url pkg:deb/debian/gtk%2B2.0@2.20.1-2
purl pkg:deb/debian/gtk%2B2.0@2.20.1-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-drq5-6jps-skax
1
vulnerability VCID-g4kk-jxb9-f3g5
2
vulnerability VCID-k2ph-py3f-aycu
3
vulnerability VCID-qwv5-ntpt-mbbp
4
vulnerability VCID-t3uk-tgks-eqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.20.1-2
aliases CVE-2010-0732
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f3g6-ambh-fkbn
2
url VCID-g4kk-jxb9-f3g5
vulnerability_id VCID-g4kk-jxb9-f3g5
summary gtk3: Integer overflow in image handling
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2016-03/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-03/msg00010.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7447.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7447.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-7447
reference_id
reference_type
scores
0
value 0.03846
scoring_system epss
scoring_elements 0.88207
published_at 2026-04-16T12:55:00Z
1
value 0.03846
scoring_system epss
scoring_elements 0.88192
published_at 2026-04-12T12:55:00Z
2
value 0.03846
scoring_system epss
scoring_elements 0.88193
published_at 2026-04-13T12:55:00Z
3
value 0.03846
scoring_system epss
scoring_elements 0.88133
published_at 2026-04-01T12:55:00Z
4
value 0.03846
scoring_system epss
scoring_elements 0.88142
published_at 2026-04-02T12:55:00Z
5
value 0.03846
scoring_system epss
scoring_elements 0.88158
published_at 2026-04-04T12:55:00Z
6
value 0.03846
scoring_system epss
scoring_elements 0.88164
published_at 2026-04-07T12:55:00Z
7
value 0.03846
scoring_system epss
scoring_elements 0.88184
published_at 2026-04-08T12:55:00Z
8
value 0.03846
scoring_system epss
scoring_elements 0.88189
published_at 2026-04-09T12:55:00Z
9
value 0.03846
scoring_system epss
scoring_elements 0.88199
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-7447
3
reference_url https://bugs.launchpad.net/ubuntu/+source/gtk+2.0/+bug/1540811
reference_id
reference_type
scores
url https://bugs.launchpad.net/ubuntu/+source/gtk+2.0/+bug/1540811
4
reference_url https://bugzilla.gnome.org/show_bug.cgi?id=703220
reference_id
reference_type
scores
url https://bugzilla.gnome.org/show_bug.cgi?id=703220
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7447
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://git.gnome.org/browse/gtk+/commit?id=894b1ae76a32720f4bb3d39cf460402e3ce331d6
reference_id
reference_type
scores
url https://git.gnome.org/browse/gtk+/commit?id=894b1ae76a32720f4bb3d39cf460402e3ce331d6
8
reference_url https://git.gnome.org/browse/gtk+/tree/NEWS
reference_id
reference_type
scores
url https://git.gnome.org/browse/gtk+/tree/NEWS
9
reference_url https://github.com/mate-desktop/eom/issues/93
reference_id
reference_type
scores
url https://github.com/mate-desktop/eom/issues/93
10
reference_url http://www.openwall.com/lists/oss-security/2016/02/10/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/02/10/2
11
reference_url http://www.openwall.com/lists/oss-security/2016/02/10/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/02/10/6
12
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
13
reference_url http://www.securityfocus.com/bid/83239
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/83239
14
reference_url http://www.ubuntu.com/usn/USN-2898-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2898-1
15
reference_url http://www.ubuntu.com/usn/USN-2898-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2898-2
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1306681
reference_id 1306681
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1306681
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799275
reference_id 799275
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=799275
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818090
reference_id 818090
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=818090
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:samsung:x14j_firmware:t-ms14jakucb-1102.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:samsung:x14j_firmware:t-ms14jakucb-1102.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:samsung:x14j_firmware:t-ms14jakucb-1102.5:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-7447
reference_id CVE-2013-7447
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2013-7447
24
reference_url https://usn.ubuntu.com/2898-1/
reference_id USN-2898-1
reference_type
scores
url https://usn.ubuntu.com/2898-1/
25
reference_url https://usn.ubuntu.com/2898-2/
reference_id USN-2898-2
reference_type
scores
url https://usn.ubuntu.com/2898-2/
fixed_packages
0
url pkg:deb/debian/gtk%2B2.0@2.24.31-2
purl pkg:deb/debian/gtk%2B2.0@2.24.31-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-t3uk-tgks-eqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.31-2
aliases CVE-2013-7447
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g4kk-jxb9-f3g5
3
url VCID-k2ph-py3f-aycu
vulnerability_id VCID-k2ph-py3f-aycu
summary
Multiple buffer overflow vulnerabilities in gdk-pixbuf may allow
    remote attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url http://ftp.gnome.org/pub/gnome/sources/gdk-pixbuf/2.32/gdk-pixbuf-2.32.0.news
reference_id
reference_type
scores
url http://ftp.gnome.org/pub/gnome/sources/gdk-pixbuf/2.32/gdk-pixbuf-2.32.0.news
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7673.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7673.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7673
reference_id
reference_type
scores
0
value 0.02374
scoring_system epss
scoring_elements 0.84988
published_at 2026-04-16T12:55:00Z
1
value 0.02374
scoring_system epss
scoring_elements 0.84889
published_at 2026-04-01T12:55:00Z
2
value 0.02374
scoring_system epss
scoring_elements 0.84905
published_at 2026-04-02T12:55:00Z
3
value 0.02374
scoring_system epss
scoring_elements 0.84923
published_at 2026-04-04T12:55:00Z
4
value 0.02374
scoring_system epss
scoring_elements 0.84927
published_at 2026-04-07T12:55:00Z
5
value 0.02374
scoring_system epss
scoring_elements 0.8495
published_at 2026-04-08T12:55:00Z
6
value 0.02374
scoring_system epss
scoring_elements 0.84957
published_at 2026-04-09T12:55:00Z
7
value 0.02374
scoring_system epss
scoring_elements 0.84973
published_at 2026-04-11T12:55:00Z
8
value 0.02374
scoring_system epss
scoring_elements 0.84972
published_at 2026-04-12T12:55:00Z
9
value 0.02374
scoring_system epss
scoring_elements 0.84967
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7673
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674
7
reference_url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=19f9685dbff7d1f929c61cf99188df917a18811d
reference_id
reference_type
scores
url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=19f9685dbff7d1f929c61cf99188df917a18811d
8
reference_url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=6ddca835100107e6b5841ce9d56074f6d98c387e
reference_id
reference_type
scores
url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=6ddca835100107e6b5841ce9d56074f6d98c387e
9
reference_url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=edf6fb8d856574bc3bb3a703037f56533229267c
reference_id
reference_type
scores
url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=edf6fb8d856574bc3bb3a703037f56533229267c
10
reference_url http://www.debian.org/security/2015/dsa-3378
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3378
11
reference_url http://www.openwall.com/lists/oss-security/2015/10/01/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/10/01/3
12
reference_url http://www.openwall.com/lists/oss-security/2015/10/02/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/10/02/9
13
reference_url http://www.securityfocus.com/bid/76953
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/76953
14
reference_url http://www.ubuntu.com/usn/USN-2767-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2767-1
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1261836
reference_id 1261836
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1261836
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7673
reference_id CVE-2015-7673
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7673
19
reference_url https://security.gentoo.org/glsa/201512-05
reference_id GLSA-201512-05
reference_type
scores
url https://security.gentoo.org/glsa/201512-05
20
reference_url https://usn.ubuntu.com/2767-1/
reference_id USN-2767-1
reference_type
scores
url https://usn.ubuntu.com/2767-1/
fixed_packages
0
url pkg:deb/debian/gtk%2B2.0@2.24.10-2
purl pkg:deb/debian/gtk%2B2.0@2.24.10-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-g4kk-jxb9-f3g5
1
vulnerability VCID-t3uk-tgks-eqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.10-2
aliases CVE-2015-7673
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k2ph-py3f-aycu
4
url VCID-qwv5-ntpt-mbbp
vulnerability_id VCID-qwv5-ntpt-mbbp
summary
Multiple buffer overflow vulnerabilities in gdk-pixbuf may allow
    remote attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url http://ftp.gnome.org/pub/gnome/sources/gdk-pixbuf/2.32/gdk-pixbuf-2.32.1.news
reference_id
reference_type
scores
url http://ftp.gnome.org/pub/gnome/sources/gdk-pixbuf/2.32/gdk-pixbuf-2.32.1.news
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7674.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7674.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7674
reference_id
reference_type
scores
0
value 0.0155
scoring_system epss
scoring_elements 0.8145
published_at 2026-04-16T12:55:00Z
1
value 0.0155
scoring_system epss
scoring_elements 0.81348
published_at 2026-04-01T12:55:00Z
2
value 0.0155
scoring_system epss
scoring_elements 0.81358
published_at 2026-04-02T12:55:00Z
3
value 0.0155
scoring_system epss
scoring_elements 0.8138
published_at 2026-04-04T12:55:00Z
4
value 0.0155
scoring_system epss
scoring_elements 0.81378
published_at 2026-04-07T12:55:00Z
5
value 0.0155
scoring_system epss
scoring_elements 0.81406
published_at 2026-04-08T12:55:00Z
6
value 0.0155
scoring_system epss
scoring_elements 0.8141
published_at 2026-04-09T12:55:00Z
7
value 0.0155
scoring_system epss
scoring_elements 0.81432
published_at 2026-04-11T12:55:00Z
8
value 0.0155
scoring_system epss
scoring_elements 0.8142
published_at 2026-04-12T12:55:00Z
9
value 0.0155
scoring_system epss
scoring_elements 0.81413
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7674
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674
7
reference_url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=e9a5704edaa9aee9498f1fbf6e1b70fcce2e55aa
reference_id
reference_type
scores
url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=e9a5704edaa9aee9498f1fbf6e1b70fcce2e55aa
8
reference_url http://www.debian.org/security/2015/dsa-3378
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3378
9
reference_url http://www.openwall.com/lists/oss-security/2015/10/01/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/10/01/4
10
reference_url http://www.openwall.com/lists/oss-security/2015/10/01/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/10/01/7
11
reference_url http://www.openwall.com/lists/oss-security/2015/10/02/10
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/10/02/10
12
reference_url http://www.openwall.com/lists/oss-security/2015/10/05/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/10/05/7
13
reference_url http://www.securityfocus.com/bid/76955
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/76955
14
reference_url http://www.ubuntu.com/usn/USN-2767-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2767-1
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1268249
reference_id 1268249
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1268249
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7674
reference_id CVE-2015-7674
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7674
22
reference_url https://security.gentoo.org/glsa/201512-05
reference_id GLSA-201512-05
reference_type
scores
url https://security.gentoo.org/glsa/201512-05
23
reference_url https://usn.ubuntu.com/2767-1/
reference_id USN-2767-1
reference_type
scores
url https://usn.ubuntu.com/2767-1/
fixed_packages
0
url pkg:deb/debian/gtk%2B2.0@2.24.10-2
purl pkg:deb/debian/gtk%2B2.0@2.24.10-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-g4kk-jxb9-f3g5
1
vulnerability VCID-t3uk-tgks-eqgr
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.10-2
aliases CVE-2015-7674
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qwv5-ntpt-mbbp
5
url VCID-t3uk-tgks-eqgr
vulnerability_id VCID-t3uk-tgks-eqgr
summary A vulnerability has been discovered in Gtk+, which can lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6655.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-6655.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-6655
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15761
published_at 2026-04-16T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.16019
published_at 2026-04-04T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.15818
published_at 2026-04-07T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15904
published_at 2026-04-08T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15965
published_at 2026-04-09T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15945
published_at 2026-04-11T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.15906
published_at 2026-04-12T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.15838
published_at 2026-04-13T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15955
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-6655
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6655
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6655
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.openwall.com/lists/oss-security/2024/09/09/1
reference_id 1
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-16T18:07:04Z/
url https://www.openwall.com/lists/oss-security/2024/09/09/1
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2297098
reference_id 2297098
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-16T18:07:04Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2297098
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
15
reference_url https://access.redhat.com/security/cve/CVE-2024-6655
reference_id CVE-2024-6655
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-16T18:07:04Z/
url https://access.redhat.com/security/cve/CVE-2024-6655
16
reference_url https://gitlab.gnome.org/GNOME/gtk/-/merge_requests/7361/diffs?commit_id=3bbf0b6176d42836d23c36a6ac410e807ec0a7a7#diff-content-e3fbe6480add9420b69f82374fb26ccac2c015a0
reference_id diffs?commit_id=3bbf0b6176d42836d23c36a6ac410e807ec0a7a7#diff-content-e3fbe6480add9420b69f82374fb26ccac2c015a0
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-16T18:07:04Z/
url https://gitlab.gnome.org/GNOME/gtk/-/merge_requests/7361/diffs?commit_id=3bbf0b6176d42836d23c36a6ac410e807ec0a7a7#diff-content-e3fbe6480add9420b69f82374fb26ccac2c015a0
17
reference_url https://security.gentoo.org/glsa/202506-05
reference_id GLSA-202506-05
reference_type
scores
url https://security.gentoo.org/glsa/202506-05
18
reference_url https://access.redhat.com/errata/RHSA-2024:6963
reference_id RHSA-2024:6963
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-16T18:07:04Z/
url https://access.redhat.com/errata/RHSA-2024:6963
19
reference_url https://access.redhat.com/errata/RHSA-2024:9184
reference_id RHSA-2024:9184
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-16T18:07:04Z/
url https://access.redhat.com/errata/RHSA-2024:9184
20
reference_url https://usn.ubuntu.com/6899-1/
reference_id USN-6899-1
reference_type
scores
url https://usn.ubuntu.com/6899-1/
fixed_packages
0
url pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1
purl pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb11u1
aliases CVE-2024-6655
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t3uk-tgks-eqgr
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.12.12-1~lenny2