Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/libpng@2:1.2.7-3.el4_7?arch=2
Typerpm
Namespaceredhat
Namelibpng
Version2:1.2.7-3.el4_7
Qualifiers
arch 2
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-pw1x-gvns-bbcx
vulnerability_id VCID-pw1x-gvns-bbcx
summary
Multiple vulnerabilities have been found in VMware Player, Server,
    and Workstation, allowing remote and local attackers to conduct several
    attacks, including privilege escalation, remote execution of arbitrary
    code, and a Denial of Service.
references
0
reference_url ftp://ftp.simplesystems.org/pub/png/src/libpng-1.2.34-ADVISORY.txt
reference_id
reference_type
scores
url ftp://ftp.simplesystems.org/pub/png/src/libpng-1.2.34-ADVISORY.txt
1
reference_url http://downloads.sourceforge.net/libpng/libpng-1.2.34-ADVISORY.txt
reference_id
reference_type
scores
url http://downloads.sourceforge.net/libpng/libpng-1.2.34-ADVISORY.txt
2
reference_url http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html
3
reference_url http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
4
reference_url http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
5
reference_url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html
9
reference_url http://lists.vmware.com/pipermail/security-announce/2009/000062.html
reference_id
reference_type
scores
url http://lists.vmware.com/pipermail/security-announce/2009/000062.html
10
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0040.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0040.json
11
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0040
reference_id
reference_type
scores
0
value 0.08276
scoring_system epss
scoring_elements 0.92255
published_at 2026-04-21T12:55:00Z
1
value 0.08276
scoring_system epss
scoring_elements 0.92209
published_at 2026-04-01T12:55:00Z
2
value 0.08276
scoring_system epss
scoring_elements 0.92242
published_at 2026-04-13T12:55:00Z
3
value 0.08276
scoring_system epss
scoring_elements 0.92254
published_at 2026-04-18T12:55:00Z
4
value 0.08276
scoring_system epss
scoring_elements 0.92216
published_at 2026-04-02T12:55:00Z
5
value 0.08276
scoring_system epss
scoring_elements 0.92222
published_at 2026-04-04T12:55:00Z
6
value 0.08276
scoring_system epss
scoring_elements 0.92225
published_at 2026-04-07T12:55:00Z
7
value 0.08276
scoring_system epss
scoring_elements 0.92235
published_at 2026-04-08T12:55:00Z
8
value 0.08276
scoring_system epss
scoring_elements 0.92239
published_at 2026-04-09T12:55:00Z
9
value 0.08276
scoring_system epss
scoring_elements 0.92245
published_at 2026-04-11T12:55:00Z
10
value 0.08276
scoring_system epss
scoring_elements 0.92246
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0040
12
reference_url http://secunia.com/advisories/33970
reference_id
reference_type
scores
url http://secunia.com/advisories/33970
13
reference_url http://secunia.com/advisories/33976
reference_id
reference_type
scores
url http://secunia.com/advisories/33976
14
reference_url http://secunia.com/advisories/34137
reference_id
reference_type
scores
url http://secunia.com/advisories/34137
15
reference_url http://secunia.com/advisories/34140
reference_id
reference_type
scores
url http://secunia.com/advisories/34140
16
reference_url http://secunia.com/advisories/34143
reference_id
reference_type
scores
url http://secunia.com/advisories/34143
17
reference_url http://secunia.com/advisories/34145
reference_id
reference_type
scores
url http://secunia.com/advisories/34145
18
reference_url http://secunia.com/advisories/34152
reference_id
reference_type
scores
url http://secunia.com/advisories/34152
19
reference_url http://secunia.com/advisories/34210
reference_id
reference_type
scores
url http://secunia.com/advisories/34210
20
reference_url http://secunia.com/advisories/34265
reference_id
reference_type
scores
url http://secunia.com/advisories/34265
21
reference_url http://secunia.com/advisories/34272
reference_id
reference_type
scores
url http://secunia.com/advisories/34272
22
reference_url http://secunia.com/advisories/34320
reference_id
reference_type
scores
url http://secunia.com/advisories/34320
23
reference_url http://secunia.com/advisories/34324
reference_id
reference_type
scores
url http://secunia.com/advisories/34324
24
reference_url http://secunia.com/advisories/34388
reference_id
reference_type
scores
url http://secunia.com/advisories/34388
25
reference_url http://secunia.com/advisories/34462
reference_id
reference_type
scores
url http://secunia.com/advisories/34462
26
reference_url http://secunia.com/advisories/34464
reference_id
reference_type
scores
url http://secunia.com/advisories/34464
27
reference_url http://secunia.com/advisories/35074
reference_id
reference_type
scores
url http://secunia.com/advisories/35074
28
reference_url http://secunia.com/advisories/35258
reference_id
reference_type
scores
url http://secunia.com/advisories/35258
29
reference_url http://secunia.com/advisories/35302
reference_id
reference_type
scores
url http://secunia.com/advisories/35302
30
reference_url http://secunia.com/advisories/35379
reference_id
reference_type
scores
url http://secunia.com/advisories/35379
31
reference_url http://secunia.com/advisories/35386
reference_id
reference_type
scores
url http://secunia.com/advisories/35386
32
reference_url http://secunia.com/advisories/36096
reference_id
reference_type
scores
url http://secunia.com/advisories/36096
33
reference_url http://security.gentoo.org/glsa/glsa-200903-28.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200903-28.xml
34
reference_url http://security.gentoo.org/glsa/glsa-201209-25.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201209-25.xml
35
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/48819
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/48819
36
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.405420
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.405420
37
reference_url http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.433952
reference_id
reference_type
scores
url http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.433952
38
reference_url http://sourceforge.net/mailarchive/message.php?msg_name=e56ccc8f0902181726i200f4bf0n20d919473ec409b7%40mail.gmail.com
reference_id
reference_type
scores
url http://sourceforge.net/mailarchive/message.php?msg_name=e56ccc8f0902181726i200f4bf0n20d919473ec409b7%40mail.gmail.com
39
reference_url http://sourceforge.net/project/shownotes.php?group_id=1689&release_id=662441
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?group_id=1689&release_id=662441
40
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10316
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10316
41
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6458
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6458
42
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1
43
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1
44
reference_url http://support.apple.com/kb/HT3549
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3549
45
reference_url http://support.apple.com/kb/HT3613
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3613
46
reference_url http://support.apple.com/kb/HT3639
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3639
47
reference_url http://support.apple.com/kb/HT3757
reference_id
reference_type
scores
url http://support.apple.com/kb/HT3757
48
reference_url http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm
49
reference_url http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm
50
reference_url http://support.avaya.com/japple/css/japple?temp.documentID=366362&temp.productID=154235&temp.releaseID=361845&temp.bucketID=126655&PAGE=Document
reference_id
reference_type
scores
url http://support.avaya.com/japple/css/japple?temp.documentID=366362&temp.productID=154235&temp.releaseID=361845&temp.bucketID=126655&PAGE=Document
51
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00272.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00272.html
52
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00412.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00412.html
53
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html
54
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html
55
reference_url http://wiki.rpath.com/Advisories:rPSA-2009-0046
reference_id
reference_type
scores
url http://wiki.rpath.com/Advisories:rPSA-2009-0046
56
reference_url http://www.debian.org/security/2009/dsa-1750
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1750
57
reference_url http://www.debian.org/security/2009/dsa-1830
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1830
58
reference_url http://www.kb.cert.org/vuls/id/649212
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/649212
59
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:051
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:051
60
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:075
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:075
61
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:083
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:083
62
reference_url http://www.redhat.com/support/errata/RHSA-2009-0315.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0315.html
63
reference_url http://www.redhat.com/support/errata/RHSA-2009-0325.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0325.html
64
reference_url http://www.redhat.com/support/errata/RHSA-2009-0333.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0333.html
65
reference_url http://www.redhat.com/support/errata/RHSA-2009-0340.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0340.html
66
reference_url http://www.securityfocus.com/archive/1/501767/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/501767/100/0/threaded
67
reference_url http://www.securityfocus.com/archive/1/503912/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/503912/100/0/threaded
68
reference_url http://www.securityfocus.com/archive/1/505990/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/505990/100/0/threaded
69
reference_url http://www.securityfocus.com/bid/33827
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/33827
70
reference_url http://www.securityfocus.com/bid/33990
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/33990
71
reference_url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA09-133A.html
72
reference_url http://www.us-cert.gov/cas/techalerts/TA09-218A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA09-218A.html
73
reference_url http://www.vmware.com/security/advisories/VMSA-2009-0007.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2009-0007.html
74
reference_url http://www.vupen.com/english/advisories/2009/0469
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0469
75
reference_url http://www.vupen.com/english/advisories/2009/0473
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0473
76
reference_url http://www.vupen.com/english/advisories/2009/0632
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/0632
77
reference_url http://www.vupen.com/english/advisories/2009/1297
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1297
78
reference_url http://www.vupen.com/english/advisories/2009/1451
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1451
79
reference_url http://www.vupen.com/english/advisories/2009/1462
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1462
80
reference_url http://www.vupen.com/english/advisories/2009/1522
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1522
81
reference_url http://www.vupen.com/english/advisories/2009/1560
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1560
82
reference_url http://www.vupen.com/english/advisories/2009/1621
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1621
83
reference_url http://www.vupen.com/english/advisories/2009/2172
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/2172
84
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=486355
reference_id 486355
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=486355
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:9.0:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise:9.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:9.0:-:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*
99
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0040
reference_id CVE-2009-0040
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0040
100
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-0040
reference_id CVE-2009-0040
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2009-0040
101
reference_url https://security.gentoo.org/glsa/200903-28
reference_id GLSA-200903-28
reference_type
scores
url https://security.gentoo.org/glsa/200903-28
102
reference_url https://security.gentoo.org/glsa/201209-25
reference_id GLSA-201209-25
reference_type
scores
url https://security.gentoo.org/glsa/201209-25
103
reference_url https://security.gentoo.org/glsa/201412-08
reference_id GLSA-201412-08
reference_type
scores
url https://security.gentoo.org/glsa/201412-08
104
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2009-10
reference_id mfsa2009-10
reference_type
scores
0
value critical
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2009-10
105
reference_url https://access.redhat.com/errata/RHSA-2009:0315
reference_id RHSA-2009:0315
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0315
106
reference_url https://access.redhat.com/errata/RHSA-2009:0325
reference_id RHSA-2009:0325
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0325
107
reference_url https://access.redhat.com/errata/RHSA-2009:0333
reference_id RHSA-2009:0333
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0333
108
reference_url https://access.redhat.com/errata/RHSA-2009:0340
reference_id RHSA-2009:0340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0340
109
reference_url https://usn.ubuntu.com/728-1/
reference_id USN-728-1
reference_type
scores
url https://usn.ubuntu.com/728-1/
110
reference_url https://usn.ubuntu.com/730-1/
reference_id USN-730-1
reference_type
scores
url https://usn.ubuntu.com/730-1/
fixed_packages
aliases CVE-2009-0040
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pw1x-gvns-bbcx
1
url VCID-zv3m-jw5c-6ubn
vulnerability_id VCID-zv3m-jw5c-6ubn
summary
POV-Ray includes a version of libpng that might allow for the execution of
    arbitrary code when reading a specially crafted PNG file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1382.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1382.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1382
reference_id
reference_type
scores
0
value 0.0633
scoring_system epss
scoring_elements 0.90929
published_at 2026-04-01T12:55:00Z
1
value 0.0633
scoring_system epss
scoring_elements 0.90935
published_at 2026-04-02T12:55:00Z
2
value 0.0633
scoring_system epss
scoring_elements 0.90944
published_at 2026-04-04T12:55:00Z
3
value 0.0633
scoring_system epss
scoring_elements 0.90954
published_at 2026-04-07T12:55:00Z
4
value 0.0633
scoring_system epss
scoring_elements 0.90965
published_at 2026-04-08T12:55:00Z
5
value 0.0633
scoring_system epss
scoring_elements 0.90971
published_at 2026-04-09T12:55:00Z
6
value 0.0633
scoring_system epss
scoring_elements 0.9098
published_at 2026-04-13T12:55:00Z
7
value 0.0633
scoring_system epss
scoring_elements 0.90981
published_at 2026-04-12T12:55:00Z
8
value 0.0633
scoring_system epss
scoring_elements 0.91005
published_at 2026-04-21T12:55:00Z
9
value 0.0633
scoring_system epss
scoring_elements 0.91004
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1382
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=441839
reference_id 441839
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=441839
3
reference_url https://security.gentoo.org/glsa/200804-15
reference_id GLSA-200804-15
reference_type
scores
url https://security.gentoo.org/glsa/200804-15
4
reference_url https://security.gentoo.org/glsa/200805-10
reference_id GLSA-200805-10
reference_type
scores
url https://security.gentoo.org/glsa/200805-10
5
reference_url https://security.gentoo.org/glsa/200812-15
reference_id GLSA-200812-15
reference_type
scores
url https://security.gentoo.org/glsa/200812-15
6
reference_url https://security.gentoo.org/glsa/201412-08
reference_id GLSA-201412-08
reference_type
scores
url https://security.gentoo.org/glsa/201412-08
7
reference_url https://access.redhat.com/errata/RHSA-2009:0333
reference_id RHSA-2009:0333
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0333
8
reference_url https://usn.ubuntu.com/730-1/
reference_id USN-730-1
reference_type
scores
url https://usn.ubuntu.com/730-1/
fixed_packages
aliases CVE-2008-1382
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zv3m-jw5c-6ubn
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libpng@2:1.2.7-3.el4_7%3Farch=2