Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1051985?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1051985?format=api", "purl": "pkg:deb/debian/netpbm-free@1:19940301.2-7", "type": "deb", "namespace": "debian", "name": "netpbm-free", "version": "1:19940301.2-7", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "2:10.0-12.2", "latest_non_vulnerable_version": "2:10.0-12.2", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89737?format=api", "vulnerability_id": "VCID-6379-1fut-nbhm", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0146.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0146.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0146", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03882", "scoring_system": "epss", "scoring_elements": "0.88188", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03882", "scoring_system": "epss", "scoring_elements": "0.88196", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03882", "scoring_system": "epss", "scoring_elements": "0.88212", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03882", "scoring_system": "epss", "scoring_elements": "0.88218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03882", "scoring_system": "epss", "scoring_elements": "0.88237", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03882", "scoring_system": "epss", "scoring_elements": "0.88243", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03882", "scoring_system": "epss", "scoring_elements": "0.88255", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03882", "scoring_system": "epss", "scoring_elements": "0.88247", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03882", "scoring_system": "epss", "scoring_elements": "0.88261", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03882", "scoring_system": "epss", "scoring_elements": "0.8826", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.03882", "scoring_system": "epss", "scoring_elements": "0.88259", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0146" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0146", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0146" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616985", "reference_id": "1616985", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616985" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:060", "reference_id": "RHSA-2003:060", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:060" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:061", "reference_id": "RHSA-2003:061", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:061" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051988?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-8sarge3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8hkk-cuf8-c3fp" }, { "vulnerability": "VCID-mbac-cudj-wfaj" }, { "vulnerability": "VCID-qa1v-juda-mbgv" }, { "vulnerability": "VCID-qyx6-j4fm-cbc9" }, { "vulnerability": "VCID-u4te-rujr-x7ek" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-8sarge3" } ], "aliases": [ "CVE-2003-0146" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6379-1fut-nbhm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88942?format=api", "vulnerability_id": "VCID-8hkk-cuf8-c3fp", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3632.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3632.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3632", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.4779", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.47722", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.4776", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.47779", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.47728", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.47783", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.47803", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.47789", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.47844", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.47837", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3632" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3632", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3632" }, { "reference_url": "http://secunia.com/advisories/17544", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17544" }, { "reference_url": "http://secunia.com/advisories/17671", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17671" }, { "reference_url": "http://secunia.com/advisories/17679", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17679" }, { "reference_url": "http://secunia.com/advisories/17828", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17828" }, { "reference_url": "http://secunia.com/advisories/18186", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18186" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11165", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11165" }, { "reference_url": "http://www.debian.org/security/2005/dsa-904", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-904" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:217", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:217" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2005_28_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2005_28_sr.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-843.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-843.html" }, { "reference_url": "http://www.securityfocus.com/bid/15514", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/15514" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2418", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2418" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617833", "reference_id": "1617833", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617833" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=351639", "reference_id": "351639", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=351639" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3632", "reference_id": "CVE-2005-3632", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3632" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:843", "reference_id": "RHSA-2005:843", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:843" }, { "reference_url": "https://usn.ubuntu.com/218-1/", "reference_id": "USN-218-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/218-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051989?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-mbac-cudj-wfaj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-11" } ], "aliases": [ "CVE-2005-3632" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8hkk-cuf8-c3fp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60622?format=api", "vulnerability_id": "VCID-mbac-cudj-wfaj", "summary": "A vulnerability in Netpbm could result in execution of arbitrary\n code or Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4274.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4274.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4274", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02543", "scoring_system": "epss", "scoring_elements": "0.85471", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02543", "scoring_system": "epss", "scoring_elements": "0.85467", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02543", "scoring_system": "epss", "scoring_elements": "0.85491", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02543", "scoring_system": "epss", "scoring_elements": "0.85495", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02543", "scoring_system": "epss", "scoring_elements": "0.85492", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02611", "scoring_system": "epss", "scoring_elements": "0.85635", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02611", "scoring_system": "epss", "scoring_elements": "0.85569", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02611", "scoring_system": "epss", "scoring_elements": "0.8565", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02611", "scoring_system": "epss", "scoring_elements": "0.85581", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02611", "scoring_system": "epss", "scoring_elements": "0.85598", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02611", "scoring_system": "epss", "scoring_elements": "0.85604", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02611", "scoring_system": "epss", "scoring_elements": "0.85624", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4274" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4274", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4274" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=546580", "reference_id": "546580", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546580" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=569060", "reference_id": "569060", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=569060" }, { "reference_url": "https://security.gentoo.org/glsa/201311-08", "reference_id": "GLSA-201311-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201311-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1811", "reference_id": "RHSA-2011:1811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1811" }, { "reference_url": "https://usn.ubuntu.com/934-1/", "reference_id": "USN-934-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/934-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1057747?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-12.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-12.2" } ], "aliases": [ "CVE-2009-4274" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mbac-cudj-wfaj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88950?format=api", "vulnerability_id": "VCID-qa1v-juda-mbgv", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2978.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2978.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2978", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04583", "scoring_system": "epss", "scoring_elements": "0.8923", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04583", "scoring_system": "epss", "scoring_elements": "0.89174", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04583", "scoring_system": "epss", "scoring_elements": "0.8918", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04583", "scoring_system": "epss", "scoring_elements": "0.89194", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04583", "scoring_system": "epss", "scoring_elements": "0.89197", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04583", "scoring_system": "epss", "scoring_elements": "0.89215", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04583", "scoring_system": "epss", "scoring_elements": "0.89219", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04583", "scoring_system": "epss", "scoring_elements": "0.89229", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04583", "scoring_system": "epss", "scoring_elements": "0.89225", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04583", "scoring_system": "epss", "scoring_elements": "0.89222", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04583", "scoring_system": "epss", "scoring_elements": "0.89234", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2978" }, { "reference_url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168278", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168278" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2978", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2978" }, { "reference_url": "http://secunia.com/advisories/17221", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17221" }, { "reference_url": "http://secunia.com/advisories/17222", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17222" }, { "reference_url": "http://secunia.com/advisories/17256", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17256" }, { "reference_url": "http://secunia.com/advisories/17265", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17265" }, { "reference_url": "http://secunia.com/advisories/17282", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17282" }, { "reference_url": "http://secunia.com/advisories/17357", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17357" }, { "reference_url": "http://securitytracker.com/id?1015071", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1015071" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10135" }, { "reference_url": "http://www.debian.org/security/2005/dsa-878", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-878" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200510-18.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200510-18.xml" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2005_24_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2005_24_sr.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-793.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-793.html" }, { "reference_url": "http://www.securityfocus.com/bid/15128", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/15128" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2133", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2133" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617774", "reference_id": "1617774", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617774" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2978", "reference_id": "CVE-2005-2978", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2978" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:793", "reference_id": "RHSA-2005:793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:793" }, { "reference_url": "https://usn.ubuntu.com/210-1/", "reference_id": "USN-210-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/210-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051989?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-mbac-cudj-wfaj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-11" } ], "aliases": [ "CVE-2005-2978" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qa1v-juda-mbgv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88943?format=api", "vulnerability_id": "VCID-qyx6-j4fm-cbc9", "summary": "security flaw", "references": [ { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3662.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3662.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3662", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51352", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51225", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51277", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51302", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51261", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51316", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51313", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51357", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51336", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51322", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51364", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51372", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3662" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3662", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3662" }, { "reference_url": "http://secunia.com/advisories/17544", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17544" }, { "reference_url": "http://secunia.com/advisories/17671", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17671" }, { "reference_url": "http://secunia.com/advisories/17679", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17679" }, { "reference_url": "http://secunia.com/advisories/17828", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17828" }, { "reference_url": "http://secunia.com/advisories/18186", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18186" }, { "reference_url": "http://secunia.com/advisories/18517", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18517" }, { "reference_url": "http://sourceforge.net/project/shownotes.php?release_id=370545", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/project/shownotes.php?release_id=370545" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9583" }, { "reference_url": "http://www.debian.org/security/2005/dsa-904", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-904" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:217", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:217" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2005_28_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2005_28_sr.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-843.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-843.html" }, { "reference_url": "http://www.securityfocus.com/bid/15427", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/15427" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2418", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2418" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617836", "reference_id": "1617836", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617836" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=351639", "reference_id": "351639", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=351639" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:greg_roelofs:pnmtopng:2.37.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:greg_roelofs:pnmtopng:2.37.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:greg_roelofs:pnmtopng:2.37.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:greg_roelofs:pnmtopng:2.37.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.38:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:greg_roelofs:pnmtopng:2.38:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.38:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3662", "reference_id": "CVE-2005-3662", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3662" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:843", "reference_id": "RHSA-2005:843", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:843" }, { "reference_url": "https://usn.ubuntu.com/218-1/", "reference_id": "USN-218-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/218-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051989?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-mbac-cudj-wfaj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-11" } ], "aliases": [ "CVE-2005-3662" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qyx6-j4fm-cbc9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49989?format=api", "vulnerability_id": "VCID-rqj6-vs48-ufbd", "summary": "Utilities included in old Netpbm versions are vulnerable to multiple\n temporary files issues, potentially allowing a local attacker to overwrite\n files with the rights of the user running the utility.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0924.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0924.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0924", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27646", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27686", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27724", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27514", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27582", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27625", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.2763", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27586", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27529", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27538", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.2751", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27472", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0924" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617099", "reference_id": "1617099", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617099" }, { "reference_url": "https://security.gentoo.org/glsa/200410-02", "reference_id": "GLSA-200410-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200410-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2004:030", "reference_id": "RHSA-2004:030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2004:030" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2004:031", "reference_id": "RHSA-2004:031", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2004:031" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051988?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-8sarge3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-8hkk-cuf8-c3fp" }, { "vulnerability": "VCID-mbac-cudj-wfaj" }, { "vulnerability": "VCID-qa1v-juda-mbgv" }, { "vulnerability": "VCID-qyx6-j4fm-cbc9" }, { "vulnerability": "VCID-u4te-rujr-x7ek" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-8sarge3" } ], "aliases": [ "CVE-2003-0924" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rqj6-vs48-ufbd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89028?format=api", "vulnerability_id": "VCID-u4te-rujr-x7ek", "summary": "security flaw", "references": [ { "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319757", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319757" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2471.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2471.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2471", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02055", "scoring_system": "epss", "scoring_elements": "0.83916", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02055", "scoring_system": "epss", "scoring_elements": "0.83817", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02055", "scoring_system": "epss", "scoring_elements": "0.8383", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02055", "scoring_system": "epss", "scoring_elements": "0.83845", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02055", "scoring_system": "epss", "scoring_elements": "0.83847", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02055", "scoring_system": "epss", "scoring_elements": "0.83871", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02055", "scoring_system": "epss", "scoring_elements": "0.83877", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02055", "scoring_system": "epss", "scoring_elements": "0.83893", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02055", "scoring_system": "epss", "scoring_elements": "0.83887", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02055", "scoring_system": "epss", "scoring_elements": "0.83883", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2471" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2471", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2471" }, { "reference_url": "http://secunia.com/advisories/16184", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/16184" }, { "reference_url": "http://secunia.com/advisories/18330", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18330" }, { "reference_url": "http://secunia.com/advisories/19436", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19436" }, { "reference_url": "http://securitytracker.com/id?1014752", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1014752" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21500", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21500" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11645", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11645" }, { "reference_url": "http://www.debian.org/security/2006/dsa-1021", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-1021" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html" }, { "reference_url": "http://www.osvdb.org/18253", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.osvdb.org/18253" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-743.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-743.html" }, { "reference_url": "http://www.securityfocus.com/bid/14379", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/14379" }, { "reference_url": "http://www.trustix.org/errata/2005/0038/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2005/0038/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617722", "reference_id": "1617722", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617722" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319757", "reference_id": "319757", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319757" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:2.10.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:2.10.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:2.10.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2471", "reference_id": "CVE-2005-2471", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2471" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:743", "reference_id": "RHSA-2005:743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:743" }, { "reference_url": "https://usn.ubuntu.com/164-1/", "reference_id": "USN-164-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/164-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051989?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-11", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-mbac-cudj-wfaj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-11" } ], "aliases": [ "CVE-2005-2471" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u4te-rujr-x7ek" } ], "fixing_vulnerabilities": [], "risk_score": "3.4", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@1:19940301.2-7" }