Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
Typedeb
Namespacedebian
Namegimp
Version2.10.34-1+deb12u10
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.0.4-3+deb13u8
Latest_non_vulnerable_version3.2.2-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1hm4-srhz-tqhb
vulnerability_id VCID-1hm4-srhz-tqhb
summary
references
0
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2046
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2046
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u9
1
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u10
2
url pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
purl pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.0.4-3%252Bdeb13u8
3
url pkg:deb/debian/gimp@3.2.2-1
purl pkg:deb/debian/gimp@3.2.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.2.2-1
aliases CVE-2026-2046
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1hm4-srhz-tqhb
1
url VCID-9v2z-2myu-bfd3
vulnerability_id VCID-9v2z-2myu-bfd3
summary
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4154.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4154.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4154
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19651
published_at 2026-04-11T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19603
published_at 2026-04-12T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19508
published_at 2026-04-16T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19544
published_at 2026-04-13T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.20952
published_at 2026-04-21T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20973
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4154
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4154
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4154
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2457530
reference_id 2457530
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2457530
5
reference_url https://gitlab.gnome.org/GNOME/gimp/-/commit/2e7ed91793792d9e980b2df4c829e9aa60459253
reference_id 2e7ed91793792d9e980b2df4c829e9aa60459253
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-13T18:24:06Z/
url https://gitlab.gnome.org/GNOME/gimp/-/commit/2e7ed91793792d9e980b2df4c829e9aa60459253
6
reference_url https://www.zerodayinitiative.com/advisories/ZDI-26-221/
reference_id ZDI-26-221
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-13T18:24:06Z/
url https://www.zerodayinitiative.com/advisories/ZDI-26-221/
fixed_packages
0
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u9
1
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u10
2
url pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
purl pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.0.4-3%252Bdeb13u8
3
url pkg:deb/debian/gimp@3.2.2-1
purl pkg:deb/debian/gimp@3.2.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.2.2-1
aliases CVE-2026-4154
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9v2z-2myu-bfd3
2
url VCID-d967-53mv-13b6
vulnerability_id VCID-d967-53mv-13b6
summary GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28863.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4152.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4152.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4152
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.0989
published_at 2026-04-21T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18012
published_at 2026-04-13T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18106
published_at 2026-04-11T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18062
published_at 2026-04-12T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.17954
published_at 2026-04-16T12:55:00Z
5
value 0.00062
scoring_system epss
scoring_elements 0.1934
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4152
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4152
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2457533
reference_id 2457533
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2457533
4
reference_url https://gitlab.gnome.org/GNOME/gimp/-/commit/f64c9c23ba3c37dc7b875a9fb477c23953b4666e
reference_id f64c9c23ba3c37dc7b875a9fb477c23953b4666e
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-13T17:24:03Z/
url https://gitlab.gnome.org/GNOME/gimp/-/commit/f64c9c23ba3c37dc7b875a9fb477c23953b4666e
5
reference_url https://www.zerodayinitiative.com/advisories/ZDI-26-219/
reference_id ZDI-26-219
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-13T17:24:03Z/
url https://www.zerodayinitiative.com/advisories/ZDI-26-219/
fixed_packages
0
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u5
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1hm4-srhz-tqhb
1
vulnerability VCID-9v2z-2myu-bfd3
2
vulnerability VCID-d967-53mv-13b6
3
vulnerability VCID-dkmg-nu4f-xbay
4
vulnerability VCID-fraw-9hj8-vbhs
5
vulnerability VCID-gfzg-1hvp-5ugd
6
vulnerability VCID-hj85-sup9-abft
7
vulnerability VCID-ney7-z8qy-kuce
8
vulnerability VCID-va44-vsem-xuf5
9
vulnerability VCID-wkrp-v537-x3hy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u5
1
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u9
2
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u10
3
url pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
purl pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.0.4-3%252Bdeb13u8
4
url pkg:deb/debian/gimp@3.2.2-1
purl pkg:deb/debian/gimp@3.2.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.2.2-1
aliases CVE-2026-4152
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d967-53mv-13b6
3
url VCID-dkmg-nu4f-xbay
vulnerability_id VCID-dkmg-nu4f-xbay
summary
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4150.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4150.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4150
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.11044
published_at 2026-04-21T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19651
published_at 2026-04-11T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19603
published_at 2026-04-12T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19508
published_at 2026-04-16T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19544
published_at 2026-04-13T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20973
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4150
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4150
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.gnome.org/GNOME/gimp/-/commit/00afdabdadeb5457fd897878b1e5aebc3780af10
reference_id 00afdabdadeb5457fd897878b1e5aebc3780af10
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-13T17:25:13Z/
url https://gitlab.gnome.org/GNOME/gimp/-/commit/00afdabdadeb5457fd897878b1e5aebc3780af10
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2457535
reference_id 2457535
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2457535
6
reference_url https://www.zerodayinitiative.com/advisories/ZDI-26-217/
reference_id ZDI-26-217
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-13T17:25:13Z/
url https://www.zerodayinitiative.com/advisories/ZDI-26-217/
fixed_packages
0
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u5
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1hm4-srhz-tqhb
1
vulnerability VCID-9v2z-2myu-bfd3
2
vulnerability VCID-d967-53mv-13b6
3
vulnerability VCID-dkmg-nu4f-xbay
4
vulnerability VCID-fraw-9hj8-vbhs
5
vulnerability VCID-gfzg-1hvp-5ugd
6
vulnerability VCID-hj85-sup9-abft
7
vulnerability VCID-ney7-z8qy-kuce
8
vulnerability VCID-va44-vsem-xuf5
9
vulnerability VCID-wkrp-v537-x3hy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u5
1
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u9
2
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u10
3
url pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
purl pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.0.4-3%252Bdeb13u8
4
url pkg:deb/debian/gimp@3.2.2-1
purl pkg:deb/debian/gimp@3.2.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.2.2-1
aliases CVE-2026-4150
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dkmg-nu4f-xbay
4
url VCID-fraw-9hj8-vbhs
vulnerability_id VCID-fraw-9hj8-vbhs
summary gimp: GIMP: Heap buffer overflow due to integer overflow in FITS image loader
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-40915.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-40915.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-40915
reference_id
reference_type
scores
0
value 0.00017
scoring_system epss
scoring_elements 0.04093
published_at 2026-04-18T12:55:00Z
1
value 0.00017
scoring_system epss
scoring_elements 0.04085
published_at 2026-04-16T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06827
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-40915
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-40915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-40915
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2458744
reference_id 2458744
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T19:32:48Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2458744
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
8
reference_url https://access.redhat.com/security/cve/CVE-2026-40915
reference_id CVE-2026-40915
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-15T19:32:48Z/
url https://access.redhat.com/security/cve/CVE-2026-40915
fixed_packages
0
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u9
1
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u10
2
url pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
purl pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.0.4-3%252Bdeb13u8
3
url pkg:deb/debian/gimp@3.2.2-1
purl pkg:deb/debian/gimp@3.2.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.2.2-1
aliases CVE-2026-40915
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fraw-9hj8-vbhs
5
url VCID-gfzg-1hvp-5ugd
vulnerability_id VCID-gfzg-1hvp-5ugd
summary gimp: predictable temporary file name in test-xcf.c unit test
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12713.json
reference_id
reference_type
scores
0
value 6.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-12713.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-12713
reference_id
reference_type
scores
0
value 0.0032
scoring_system epss
scoring_elements 0.54942
published_at 2026-04-01T12:55:00Z
1
value 0.0032
scoring_system epss
scoring_elements 0.55098
published_at 2026-04-08T12:55:00Z
2
value 0.0032
scoring_system epss
scoring_elements 0.55047
published_at 2026-04-02T12:55:00Z
3
value 0.0032
scoring_system epss
scoring_elements 0.55072
published_at 2026-04-04T12:55:00Z
4
value 0.0032
scoring_system epss
scoring_elements 0.55048
published_at 2026-04-07T12:55:00Z
5
value 0.0032
scoring_system epss
scoring_elements 0.55097
published_at 2026-04-09T12:55:00Z
6
value 0.0032
scoring_system epss
scoring_elements 0.55109
published_at 2026-04-11T12:55:00Z
7
value 0.0032
scoring_system epss
scoring_elements 0.55089
published_at 2026-04-12T12:55:00Z
8
value 0.00371
scoring_system epss
scoring_elements 0.58962
published_at 2026-04-18T12:55:00Z
9
value 0.00371
scoring_system epss
scoring_elements 0.58958
published_at 2026-04-16T12:55:00Z
10
value 0.00371
scoring_system epss
scoring_elements 0.5894
published_at 2026-04-21T12:55:00Z
11
value 0.00371
scoring_system epss
scoring_elements 0.58924
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-12713
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12713
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12713
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/GNOME/gimp/commit/c21eff4b031acb04fb4dfce8bd5fdfecc2b6524f
reference_id
reference_type
scores
url https://github.com/GNOME/gimp/commit/c21eff4b031acb04fb4dfce8bd5fdfecc2b6524f
5
reference_url https://gitlab.gnome.org/GNOME/gimp/issues/1689
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/gimp/issues/1689
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1595819
reference_id 1595819
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1595819
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-12713
reference_id CVE-2018-12713
reference_type
scores
0
value 6.4
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:N
1
value 9.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2018-12713
fixed_packages
0
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u9
1
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u10
aliases CVE-2018-12713
risk_score 4.1
exploitability 0.5
weighted_severity 8.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gfzg-1hvp-5ugd
6
url VCID-hj85-sup9-abft
vulnerability_id VCID-hj85-sup9-abft
summary gimp: GIMP:Memory disclosure and denial of service via specially crafted PCX image
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4887.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4887.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4887
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.196
published_at 2026-04-21T12:55:00Z
1
value 0.00087
scoring_system epss
scoring_elements 0.25065
published_at 2026-04-02T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.25006
published_at 2026-04-11T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.24965
published_at 2026-04-12T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.24911
published_at 2026-04-13T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.24924
published_at 2026-04-16T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.24916
published_at 2026-04-18T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.25103
published_at 2026-04-04T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.24878
published_at 2026-04-07T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.24947
published_at 2026-04-08T12:55:00Z
10
value 0.00087
scoring_system epss
scoring_elements 0.24992
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4887
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4887
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4887
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.gnome.org/GNOME/gimp/-/issues/15960
reference_id 15960
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:58:38Z/
url https://gitlab.gnome.org/GNOME/gimp/-/issues/15960
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2451669
reference_id 2451669
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:58:38Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2451669
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
10
reference_url https://access.redhat.com/security/cve/CVE-2026-4887
reference_id CVE-2026-4887
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T12:58:38Z/
url https://access.redhat.com/security/cve/CVE-2026-4887
fixed_packages
0
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u9
1
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u10
2
url pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
purl pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.0.4-3%252Bdeb13u8
3
url pkg:deb/debian/gimp@3.2.2-1
purl pkg:deb/debian/gimp@3.2.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.2.2-1
aliases CVE-2026-4887
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hj85-sup9-abft
7
url VCID-ney7-z8qy-kuce
vulnerability_id VCID-ney7-z8qy-kuce
summary
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4153.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4153.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4153
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18106
published_at 2026-04-11T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18062
published_at 2026-04-12T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.17954
published_at 2026-04-16T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.18012
published_at 2026-04-13T12:55:00Z
4
value 0.00062
scoring_system epss
scoring_elements 0.19354
published_at 2026-04-21T12:55:00Z
5
value 0.00062
scoring_system epss
scoring_elements 0.1934
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4153
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4153
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2457536
reference_id 2457536
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2457536
5
reference_url https://gitlab.gnome.org/GNOME/gimp/-/commit/98cb1371fd4e22cca75017ea3252dc32fc218712
reference_id 98cb1371fd4e22cca75017ea3252dc32fc218712
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-13T18:24:23Z/
url https://gitlab.gnome.org/GNOME/gimp/-/commit/98cb1371fd4e22cca75017ea3252dc32fc218712
6
reference_url https://www.zerodayinitiative.com/advisories/ZDI-26-220/
reference_id ZDI-26-220
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-13T18:24:23Z/
url https://www.zerodayinitiative.com/advisories/ZDI-26-220/
fixed_packages
0
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u5
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1hm4-srhz-tqhb
1
vulnerability VCID-9v2z-2myu-bfd3
2
vulnerability VCID-d967-53mv-13b6
3
vulnerability VCID-dkmg-nu4f-xbay
4
vulnerability VCID-fraw-9hj8-vbhs
5
vulnerability VCID-gfzg-1hvp-5ugd
6
vulnerability VCID-hj85-sup9-abft
7
vulnerability VCID-ney7-z8qy-kuce
8
vulnerability VCID-va44-vsem-xuf5
9
vulnerability VCID-wkrp-v537-x3hy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u5
1
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u9
2
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u10
3
url pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
purl pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.0.4-3%252Bdeb13u8
4
url pkg:deb/debian/gimp@3.2.2-1
purl pkg:deb/debian/gimp@3.2.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.2.2-1
aliases CVE-2026-4153
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ney7-z8qy-kuce
8
url VCID-va44-vsem-xuf5
vulnerability_id VCID-va44-vsem-xuf5
summary
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4151.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-4151.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-4151
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.11044
published_at 2026-04-21T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19651
published_at 2026-04-11T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19603
published_at 2026-04-12T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19508
published_at 2026-04-16T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19544
published_at 2026-04-13T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20973
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-4151
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4151
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4151
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.gnome.org/GNOME/gimp/-/commit/09e5459de913172fc51da3bd6b6adc533acd368e
reference_id 09e5459de913172fc51da3bd6b6adc533acd368e
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-13T17:24:45Z/
url https://gitlab.gnome.org/GNOME/gimp/-/commit/09e5459de913172fc51da3bd6b6adc533acd368e
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2457532
reference_id 2457532
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2457532
6
reference_url https://www.zerodayinitiative.com/advisories/ZDI-26-218/
reference_id ZDI-26-218
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-13T17:24:45Z/
url https://www.zerodayinitiative.com/advisories/ZDI-26-218/
fixed_packages
0
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u9
1
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u10
2
url pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
purl pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.0.4-3%252Bdeb13u8
3
url pkg:deb/debian/gimp@3.2.2-1
purl pkg:deb/debian/gimp@3.2.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.2.2-1
aliases CVE-2026-4151
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-va44-vsem-xuf5
9
url VCID-wkrp-v537-x3hy
vulnerability_id VCID-wkrp-v537-x3hy
summary gimp: GIMP: Arbitrary code execution or denial of service via buffer overflow in GIF image processing
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-6384.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-6384.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-6384
reference_id
reference_type
scores
0
value 0.00013
scoring_system epss
scoring_elements 0.02145
published_at 2026-04-21T12:55:00Z
1
value 0.00013
scoring_system epss
scoring_elements 0.01955
published_at 2026-04-16T12:55:00Z
2
value 0.00013
scoring_system epss
scoring_elements 0.01957
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-6384
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6384
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6384
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2458749
reference_id 2458749
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T19:31:26Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2458749
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
8
reference_url https://access.redhat.com/security/cve/CVE-2026-6384
reference_id CVE-2026-6384
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-04-15T19:31:26Z/
url https://access.redhat.com/security/cve/CVE-2026-6384
fixed_packages
0
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u9
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u9
1
url pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
purl pkg:deb/debian/gimp@2.10.34-1%2Bdeb12u10
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u10
2
url pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
purl pkg:deb/debian/gimp@3.0.4-3%2Bdeb13u8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.0.4-3%252Bdeb13u8
3
url pkg:deb/debian/gimp@3.2.2-1
purl pkg:deb/debian/gimp@3.2.2-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@3.2.2-1
aliases CVE-2026-6384
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wkrp-v537-x3hy
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/gimp@2.10.34-1%252Bdeb12u10