Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
Typedeb
Namespacedebian
Namegimp
Version3.0.4-3+deb13u8
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.2.2-1
Latest_non_vulnerable_version3.2.2-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1hm4-srhz-tqhb
vulnerability_id VCID-1hm4-srhz-tqhb
summary
references
0
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2046
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u9
1
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u10
2
url pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
purl pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.0.4-3%252Bdeb13u8
3
url pkg:deb/debian/gimp@3.2.2-1
purl pkg:deb/debian/gimp@3.2.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.2.2-1
aliases CVE-2026-2046
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1hm4-srhz-tqhb
1
url VCID-9v2z-2myu-bfd3
vulnerability_id VCID-9v2z-2myu-bfd3
summary
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4154.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4154.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4154
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19651
published_at 2026-04-11T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19603
published_at 2026-04-12T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19508
published_at 2026-04-16T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19544
published_at 2026-04-13T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.20952
published_at 2026-04-21T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20973
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4154
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4154
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4154
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2457530
reference_id 2457530
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2457530
5
reference_url https://gitlab.gnome.org/GNOME/gimp/-/commit/2e7ed91793792d9e980b2df4c829e9aa60459253
reference_id 2e7ed91793792d9e980b2df4c829e9aa60459253
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-13T18:24:06Z/
url https://gitlab.gnome.org/GNOME/gimp/-/commit/2e7ed91793792d9e980b2df4c829e9aa60459253
6
reference_url https://www.zerodayinitiative.com/advisories/ZDI-26-221/
reference_id ZDI-26-221
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-13T18:24:06Z/
url https://www.zerodayinitiative.com/advisories/ZDI-26-221/
fixed_packages
0
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u9
1
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u10
2
url pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
purl pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.0.4-3%252Bdeb13u8
3
url pkg:deb/debian/gimp@3.2.2-1
purl pkg:deb/debian/gimp@3.2.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.2.2-1
aliases CVE-2026-4154
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9v2z-2myu-bfd3
2
url VCID-d967-53mv-13b6
vulnerability_id VCID-d967-53mv-13b6
summary GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28863.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4152.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4152.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4152
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.0989
published_at 2026-04-21T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18012
published_at 2026-04-13T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18106
published_at 2026-04-11T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18062
published_at 2026-04-12T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.17954
published_at 2026-04-16T12:55:00Z
5
value 0.00062
scoring_system epss
scoring_elements 0.1934
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4152
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4152
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2457533
reference_id 2457533
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2457533
4
reference_url https://gitlab.gnome.org/GNOME/gimp/-/commit/f64c9c23ba3c37dc7b875a9fb477c23953b4666e
reference_id f64c9c23ba3c37dc7b875a9fb477c23953b4666e
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-13T17:24:03Z/
url https://gitlab.gnome.org/GNOME/gimp/-/commit/f64c9c23ba3c37dc7b875a9fb477c23953b4666e
5
reference_url https://www.zerodayinitiative.com/advisories/ZDI-26-219/
reference_id ZDI-26-219
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-13T17:24:03Z/
url https://www.zerodayinitiative.com/advisories/ZDI-26-219/
fixed_packages
0
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u5
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1hm4-srhz-tqhb
1
vulnerability VCID-9v2z-2myu-bfd3
2
vulnerability VCID-d967-53mv-13b6
3
vulnerability VCID-dkmg-nu4f-xbay
4
vulnerability VCID-fraw-9hj8-vbhs
5
vulnerability VCID-gfzg-1hvp-5ugd
6
vulnerability VCID-hj85-sup9-abft
7
vulnerability VCID-ney7-z8qy-kuce
8
vulnerability VCID-va44-vsem-xuf5
9
vulnerability VCID-wkrp-v537-x3hy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u5
1
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u9
2
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u10
3
url pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
purl pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.0.4-3%252Bdeb13u8
4
url pkg:deb/debian/gimp@3.2.2-1
purl pkg:deb/debian/gimp@3.2.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.2.2-1
aliases CVE-2026-4152
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d967-53mv-13b6
3
url VCID-dkmg-nu4f-xbay
vulnerability_id VCID-dkmg-nu4f-xbay
summary
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4150.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4150.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4150
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.11044
published_at 2026-04-21T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19651
published_at 2026-04-11T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19603
published_at 2026-04-12T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19508
published_at 2026-04-16T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19544
published_at 2026-04-13T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20973
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4150
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4150
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.gnome.org/GNOME/gimp/-/commit/00afdabdadeb5457fd897878b1e5aebc3780af10
reference_id 00afdabdadeb5457fd897878b1e5aebc3780af10
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-13T17:25:13Z/
url https://gitlab.gnome.org/GNOME/gimp/-/commit/00afdabdadeb5457fd897878b1e5aebc3780af10
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2457535
reference_id 2457535
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2457535
6
reference_url https://www.zerodayinitiative.com/advisories/ZDI-26-217/
reference_id ZDI-26-217
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-13T17:25:13Z/
url https://www.zerodayinitiative.com/advisories/ZDI-26-217/
fixed_packages
0
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u5
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1hm4-srhz-tqhb
1
vulnerability VCID-9v2z-2myu-bfd3
2
vulnerability VCID-d967-53mv-13b6
3
vulnerability VCID-dkmg-nu4f-xbay
4
vulnerability VCID-fraw-9hj8-vbhs
5
vulnerability VCID-gfzg-1hvp-5ugd
6
vulnerability VCID-hj85-sup9-abft
7
vulnerability VCID-ney7-z8qy-kuce
8
vulnerability VCID-va44-vsem-xuf5
9
vulnerability VCID-wkrp-v537-x3hy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u5
1
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u9
2
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u10
3
url pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
purl pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.0.4-3%252Bdeb13u8
4
url pkg:deb/debian/gimp@3.2.2-1
purl pkg:deb/debian/gimp@3.2.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.2.2-1
aliases CVE-2026-4150
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dkmg-nu4f-xbay
4
url VCID-fraw-9hj8-vbhs
vulnerability_id VCID-fraw-9hj8-vbhs
summary gimp: GIMP: Heap buffer overflow due to integer overflow in FITS image loader
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-40915.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-40915.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-40915
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04093
published_at 2026-04-18T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04085
published_at 2026-04-16T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06827
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-40915
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-40915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-40915
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2458744
reference_id 2458744
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T19:32:48Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2458744
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
8
reference_url https://access.redhat.com/security/cve/CVE-2026-40915
reference_id CVE-2026-40915
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T19:32:48Z/
url https://access.redhat.com/security/cve/CVE-2026-40915
fixed_packages
0
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u9
1
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u10
2
url pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
purl pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.0.4-3%252Bdeb13u8
3
url pkg:deb/debian/gimp@3.2.2-1
purl pkg:deb/debian/gimp@3.2.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.2.2-1
aliases CVE-2026-40915
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fraw-9hj8-vbhs
5
url VCID-hj85-sup9-abft
vulnerability_id VCID-hj85-sup9-abft
summary gimp: GIMP:Memory disclosure and denial of service via specially crafted PCX image
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4887.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4887.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4887
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.196
published_at 2026-04-21T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.25065
published_at 2026-04-02T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.25006
published_at 2026-04-11T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.24965
published_at 2026-04-12T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.24911
published_at 2026-04-13T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.24924
published_at 2026-04-16T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.24916
published_at 2026-04-18T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.25103
published_at 2026-04-04T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.24878
published_at 2026-04-07T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.24947
published_at 2026-04-08T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.24992
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4887
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4887
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4887
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.gnome.org/GNOME/gimp/-/issues/15960
reference_id 15960
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:58:38Z/
url https://gitlab.gnome.org/GNOME/gimp/-/issues/15960
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2451669
reference_id 2451669
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:58:38Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2451669
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
10
reference_url https://access.redhat.com/security/cve/CVE-2026-4887
reference_id CVE-2026-4887
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:58:38Z/
url https://access.redhat.com/security/cve/CVE-2026-4887
fixed_packages
0
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u9
1
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u10
2
url pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
purl pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.0.4-3%252Bdeb13u8
3
url pkg:deb/debian/gimp@3.2.2-1
purl pkg:deb/debian/gimp@3.2.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.2.2-1
aliases CVE-2026-4887
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hj85-sup9-abft
6
url VCID-ney7-z8qy-kuce
vulnerability_id VCID-ney7-z8qy-kuce
summary
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4153.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4153.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4153
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18106
published_at 2026-04-11T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18062
published_at 2026-04-12T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.17954
published_at 2026-04-16T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18012
published_at 2026-04-13T12:55:00Z
4
value 0.00062
scoring_system epss
scoring_elements 0.19354
published_at 2026-04-21T12:55:00Z
5
value 0.00062
scoring_system epss
scoring_elements 0.1934
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4153
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4153
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2457536
reference_id 2457536
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2457536
5
reference_url https://gitlab.gnome.org/GNOME/gimp/-/commit/98cb1371fd4e22cca75017ea3252dc32fc218712
reference_id 98cb1371fd4e22cca75017ea3252dc32fc218712
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-13T18:24:23Z/
url https://gitlab.gnome.org/GNOME/gimp/-/commit/98cb1371fd4e22cca75017ea3252dc32fc218712
6
reference_url https://www.zerodayinitiative.com/advisories/ZDI-26-220/
reference_id ZDI-26-220
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-13T18:24:23Z/
url https://www.zerodayinitiative.com/advisories/ZDI-26-220/
fixed_packages
0
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u5
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1hm4-srhz-tqhb
1
vulnerability VCID-9v2z-2myu-bfd3
2
vulnerability VCID-d967-53mv-13b6
3
vulnerability VCID-dkmg-nu4f-xbay
4
vulnerability VCID-fraw-9hj8-vbhs
5
vulnerability VCID-gfzg-1hvp-5ugd
6
vulnerability VCID-hj85-sup9-abft
7
vulnerability VCID-ney7-z8qy-kuce
8
vulnerability VCID-va44-vsem-xuf5
9
vulnerability VCID-wkrp-v537-x3hy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u5
1
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u9
2
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u10
3
url pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
purl pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.0.4-3%252Bdeb13u8
4
url pkg:deb/debian/gimp@3.2.2-1
purl pkg:deb/debian/gimp@3.2.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.2.2-1
aliases CVE-2026-4153
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ney7-z8qy-kuce
7
url VCID-rw3k-nfe2-4qd2
vulnerability_id VCID-rw3k-nfe2-4qd2
summary gimp: GIMP ILBM File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10925.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-10925.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-10925
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15963
published_at 2026-04-02T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15828
published_at 2026-04-07T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.16027
published_at 2026-04-04T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.18978
published_at 2026-04-08T12:55:00Z
4
value 0.00294
scoring_system epss
scoring_elements 0.52764
published_at 2026-04-16T12:55:00Z
5
value 0.00294
scoring_system epss
scoring_elements 0.52758
published_at 2026-04-11T12:55:00Z
6
value 0.00294
scoring_system epss
scoring_elements 0.52741
published_at 2026-04-12T12:55:00Z
7
value 0.00294
scoring_system epss
scoring_elements 0.52725
published_at 2026-04-13T12:55:00Z
8
value 0.00294
scoring_system epss
scoring_elements 0.52771
published_at 2026-04-18T12:55:00Z
9
value 0.00294
scoring_system epss
scoring_elements 0.52707
published_at 2026-04-09T12:55:00Z
10
value 0.00743
scoring_system epss
scoring_elements 0.73053
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-10925
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2407199
reference_id 2407199
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2407199
4
reference_url https://gitlab.gnome.org/GNOME/gimp/-/merge_requests/2450
reference_id 2450
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:17Z/
url https://gitlab.gnome.org/GNOME/gimp/-/merge_requests/2450
5
reference_url https://access.redhat.com/errata/RHSA-2025:21968
reference_id RHSA-2025:21968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:21968
6
reference_url https://access.redhat.com/errata/RHSA-2025:22417
reference_id RHSA-2025:22417
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22417
7
reference_url https://www.zerodayinitiative.com/advisories/ZDI-25-914/
reference_id ZDI-25-914
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-10-31T03:55:17Z/
url https://www.zerodayinitiative.com/advisories/ZDI-25-914/
fixed_packages
0
url pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
purl pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.0.4-3%252Bdeb13u8
1
url pkg:deb/debian/gimp@3.2.2-1
purl pkg:deb/debian/gimp@3.2.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.2.2-1
aliases CVE-2025-10925
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rw3k-nfe2-4qd2
8
url VCID-va44-vsem-xuf5
vulnerability_id VCID-va44-vsem-xuf5
summary
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4151.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4151.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4151
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.11044
published_at 2026-04-21T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19651
published_at 2026-04-11T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19603
published_at 2026-04-12T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19508
published_at 2026-04-16T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19544
published_at 2026-04-13T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20973
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4151
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4151
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.gnome.org/GNOME/gimp/-/commit/09e5459de913172fc51da3bd6b6adc533acd368e
reference_id 09e5459de913172fc51da3bd6b6adc533acd368e
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-13T17:24:45Z/
url https://gitlab.gnome.org/GNOME/gimp/-/commit/09e5459de913172fc51da3bd6b6adc533acd368e
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2457532
reference_id 2457532
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2457532
6
reference_url https://www.zerodayinitiative.com/advisories/ZDI-26-218/
reference_id ZDI-26-218
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-13T17:24:45Z/
url https://www.zerodayinitiative.com/advisories/ZDI-26-218/
fixed_packages
0
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u9
1
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u10
2
url pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
purl pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.0.4-3%252Bdeb13u8
3
url pkg:deb/debian/gimp@3.2.2-1
purl pkg:deb/debian/gimp@3.2.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.2.2-1
aliases CVE-2026-4151
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-va44-vsem-xuf5
9
url VCID-wkrp-v537-x3hy
vulnerability_id VCID-wkrp-v537-x3hy
summary gimp: GIMP: Arbitrary code execution or denial of service via buffer overflow in GIF image processing
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-6384.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-6384.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-6384
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02145
published_at 2026-04-21T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.01955
published_at 2026-04-16T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.01957
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-6384
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6384
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2458749
reference_id 2458749
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T19:31:26Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2458749
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
8
reference_url https://access.redhat.com/security/cve/CVE-2026-6384
reference_id CVE-2026-6384
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T19:31:26Z/
url https://access.redhat.com/security/cve/CVE-2026-6384
fixed_packages
0
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u9
1
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u10
2
url pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
purl pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.0.4-3%252Bdeb13u8
3
url pkg:deb/debian/gimp@3.2.2-1
purl pkg:deb/debian/gimp@3.2.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.2.2-1
aliases CVE-2026-6384
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wkrp-v537-x3hy
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.0.4-3%252Bdeb13u8