Lookup for vulnerable packages by Package URL.

Purlpkg:nuget/libpng@1.6.0
Typenuget
Namespace
Namelibpng
Version1.6.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-3ggs-vja8-r3de
vulnerability_id VCID-3ggs-vja8-r3de
summary
Improper Restriction of Operations within the Bounds of a Memory Buffer
Buffer overflow in the png_read_IDAT_data function in pngrutil.c in libpng allows context-dependent attackers to execute arbitrary code via IDAT data with a large width, a different vulnerability than CVE-2014-9495.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0973.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0973.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0973
reference_id
reference_type
scores
0
value 0.02006
scoring_system epss
scoring_elements 0.83617
published_at 2026-04-01T12:55:00Z
1
value 0.02006
scoring_system epss
scoring_elements 0.8363
published_at 2026-04-02T12:55:00Z
2
value 0.02006
scoring_system epss
scoring_elements 0.83644
published_at 2026-04-04T12:55:00Z
3
value 0.02006
scoring_system epss
scoring_elements 0.83646
published_at 2026-04-07T12:55:00Z
4
value 0.02006
scoring_system epss
scoring_elements 0.8367
published_at 2026-04-08T12:55:00Z
5
value 0.02006
scoring_system epss
scoring_elements 0.83677
published_at 2026-04-09T12:55:00Z
6
value 0.02006
scoring_system epss
scoring_elements 0.83694
published_at 2026-04-11T12:55:00Z
7
value 0.02006
scoring_system epss
scoring_elements 0.83687
published_at 2026-04-12T12:55:00Z
8
value 0.02006
scoring_system epss
scoring_elements 0.83683
published_at 2026-04-13T12:55:00Z
9
value 0.02006
scoring_system epss
scoring_elements 0.83718
published_at 2026-04-16T12:55:00Z
10
value 0.02006
scoring_system epss
scoring_elements 0.83719
published_at 2026-04-21T12:55:00Z
11
value 0.02006
scoring_system epss
scoring_elements 0.83744
published_at 2026-04-24T12:55:00Z
12
value 0.02006
scoring_system epss
scoring_elements 0.83752
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0973
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0973
3
reference_url http://www.openwall.com/lists/oss-security/2015/01/10/1
reference_id 1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:25:31Z/
url http://www.openwall.com/lists/oss-security/2015/01/10/1
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1177327
reference_id 1177327
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1177327
5
reference_url http://www.openwall.com/lists/oss-security/2015/01/10/3
reference_id 3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:25:31Z/
url http://www.openwall.com/lists/oss-security/2015/01/10/3
6
reference_url http://sourceforge.net/p/png-mng/mailman/message/33173461/
reference_id 33173461
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:25:31Z/
url http://sourceforge.net/p/png-mng/mailman/message/33173461/
7
reference_url http://secunia.com/advisories/62725
reference_id 62725
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:25:31Z/
url http://secunia.com/advisories/62725
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773823
reference_id 773823
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773823
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775673
reference_id 775673
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775673
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-0973
reference_id CVE-2015-0973
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2015-0973
11
reference_url http://tfpwn.com/files/libpng_heap_overflow_1.6.15.txt
reference_id libpng_heap_overflow_1.6.15.txt
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:25:31Z/
url http://tfpwn.com/files/libpng_heap_overflow_1.6.15.txt
12
reference_url https://security.netapp.com/advisory/ntap-20240719-0005/
reference_id ntap-20240719-0005
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:25:31Z/
url https://security.netapp.com/advisory/ntap-20240719-0005/
fixed_packages
0
url pkg:nuget/libpng@1.6.18.1
purl pkg:nuget/libpng@1.6.18.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1h1a-mpgm-w3hf
1
vulnerability VCID-8g2j-rqsk-zqfh
2
vulnerability VCID-cu24-1rcd-93g3
3
vulnerability VCID-zetn-zwnv-u7gf
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/libpng@1.6.18.1
aliases CVE-2015-0973
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3ggs-vja8-r3de
1
url VCID-cu24-1rcd-93g3
vulnerability_id VCID-cu24-1rcd-93g3
summary
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng  allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.
references
0
reference_url http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
reference_id
reference_type
scores
url http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
1
reference_url http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172324.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172324.html
3
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172620.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172620.html
4
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172647.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172647.html
5
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172663.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172663.html
6
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172769.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172769.html
7
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172797.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172797.html
8
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172823.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172823.html
9
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177344.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177344.html
10
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177382.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177382.html
11
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174905.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174905.html
12
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174936.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174936.html
13
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175073.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175073.html
14
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00033.html
15
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00034.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00034.html
16
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
17
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
18
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
19
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
20
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
21
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
22
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
23
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
24
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00014.html
25
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00015.html
26
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00018.html
27
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00028.html
28
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00159.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00159.html
29
reference_url http://lists.opensuse.org/opensuse-updates/2015-11/msg00160.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-11/msg00160.html
30
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00062.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00062.html
31
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00063.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00063.html
32
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00028.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00028.html
33
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00029.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00029.html
34
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00030.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00030.html
35
reference_url http://rhn.redhat.com/errata/RHSA-2015-2594.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2594.html
36
reference_url http://rhn.redhat.com/errata/RHSA-2015-2595.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2595.html
37
reference_url http://rhn.redhat.com/errata/RHSA-2015-2596.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-2596.html
38
reference_url http://rhn.redhat.com/errata/RHSA-2016-0055.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0055.html
39
reference_url http://rhn.redhat.com/errata/RHSA-2016-0056.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0056.html
40
reference_url http://rhn.redhat.com/errata/RHSA-2016-0057.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0057.html
41
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8126.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8126.json
42
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8126
reference_id
reference_type
scores
0
value 0.07516
scoring_system epss
scoring_elements 0.91825
published_at 2026-04-26T12:55:00Z
1
value 0.07516
scoring_system epss
scoring_elements 0.91826
published_at 2026-04-24T12:55:00Z
2
value 0.07516
scoring_system epss
scoring_elements 0.91765
published_at 2026-04-01T12:55:00Z
3
value 0.07516
scoring_system epss
scoring_elements 0.91773
published_at 2026-04-02T12:55:00Z
4
value 0.07516
scoring_system epss
scoring_elements 0.91779
published_at 2026-04-04T12:55:00Z
5
value 0.07516
scoring_system epss
scoring_elements 0.91787
published_at 2026-04-07T12:55:00Z
6
value 0.07516
scoring_system epss
scoring_elements 0.918
published_at 2026-04-08T12:55:00Z
7
value 0.07516
scoring_system epss
scoring_elements 0.91806
published_at 2026-04-09T12:55:00Z
8
value 0.07516
scoring_system epss
scoring_elements 0.91809
published_at 2026-04-11T12:55:00Z
9
value 0.07516
scoring_system epss
scoring_elements 0.91811
published_at 2026-04-12T12:55:00Z
10
value 0.07516
scoring_system epss
scoring_elements 0.91807
published_at 2026-04-13T12:55:00Z
11
value 0.07516
scoring_system epss
scoring_elements 0.91827
published_at 2026-04-16T12:55:00Z
12
value 0.07516
scoring_system epss
scoring_elements 0.91819
published_at 2026-04-18T12:55:00Z
13
value 0.07516
scoring_system epss
scoring_elements 0.9182
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8126
43
reference_url https://code.google.com/p/chromium/issues/detail?id=560291
reference_id
reference_type
scores
url https://code.google.com/p/chromium/issues/detail?id=560291
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7981
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2843
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2844
61
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2845
62
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
63
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10148
reference_id
reference_type
scores
url https://kc.mcafee.com/corporate/index?page=content&id=SB10148
64
reference_url https://support.apple.com/HT206167
reference_id
reference_type
scores
url https://support.apple.com/HT206167
65
reference_url http://www.debian.org/security/2015/dsa-3399
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3399
66
reference_url http://www.debian.org/security/2016/dsa-3507
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3507
67
reference_url http://www.openwall.com/lists/oss-security/2015/11/12/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/11/12/2
68
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
69
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
70
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
71
reference_url http://www.securityfocus.com/bid/77568
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/77568
72
reference_url http://www.securitytracker.com/id/1034142
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034142
73
reference_url http://www.ubuntu.com/usn/USN-2815-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2815-1
74
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1281756
reference_id 1281756
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1281756
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update65:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update65:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update65:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update65:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update65:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update65:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.6:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp4:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:12:sp1:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_id cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:12:sp1:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8126
reference_id CVE-2015-8126
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-8126
134
reference_url https://security.gentoo.org/glsa/201603-09
reference_id GLSA-201603-09
reference_type
scores
url https://security.gentoo.org/glsa/201603-09
135
reference_url https://security.gentoo.org/glsa/201611-08
reference_id GLSA-201611-08
reference_type
scores
url https://security.gentoo.org/glsa/201611-08
136
reference_url https://access.redhat.com/errata/RHSA-2015:2594
reference_id RHSA-2015:2594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2594
137
reference_url https://access.redhat.com/errata/RHSA-2015:2595
reference_id RHSA-2015:2595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2595
138
reference_url https://access.redhat.com/errata/RHSA-2015:2596
reference_id RHSA-2015:2596
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:2596
139
reference_url https://access.redhat.com/errata/RHSA-2016:0055
reference_id RHSA-2016:0055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0055
140
reference_url https://access.redhat.com/errata/RHSA-2016:0056
reference_id RHSA-2016:0056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0056
141
reference_url https://access.redhat.com/errata/RHSA-2016:0057
reference_id RHSA-2016:0057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0057
142
reference_url https://access.redhat.com/errata/RHSA-2016:0098
reference_id RHSA-2016:0098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0098
143
reference_url https://access.redhat.com/errata/RHSA-2016:0099
reference_id RHSA-2016:0099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0099
144
reference_url https://access.redhat.com/errata/RHSA-2016:0100
reference_id RHSA-2016:0100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0100
145
reference_url https://access.redhat.com/errata/RHSA-2016:0101
reference_id RHSA-2016:0101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0101
146
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
147
reference_url https://usn.ubuntu.com/2815-1/
reference_id USN-2815-1
reference_type
scores
url https://usn.ubuntu.com/2815-1/
fixed_packages
0
url pkg:nuget/libpng@1.6.19.1
purl pkg:nuget/libpng@1.6.19.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8g2j-rqsk-zqfh
1
vulnerability VCID-zetn-zwnv-u7gf
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/libpng@1.6.19.1
aliases CVE-2015-8126
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cu24-1rcd-93g3
2
url VCID-had5-3tnv-k3hm
vulnerability_id VCID-had5-3tnv-k3hm
summary
Uncontrolled Resource Consumption
The png_do_expand_palette function in libpng allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via (1) a PLTE chunk of zero bytes or (2) a NULL palette, related to pngrtran.c and pngset.c.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6954.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6954.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-6954
reference_id
reference_type
scores
0
value 0.03546
scoring_system epss
scoring_elements 0.87629
published_at 2026-04-01T12:55:00Z
1
value 0.03546
scoring_system epss
scoring_elements 0.8764
published_at 2026-04-02T12:55:00Z
2
value 0.03546
scoring_system epss
scoring_elements 0.87652
published_at 2026-04-04T12:55:00Z
3
value 0.03546
scoring_system epss
scoring_elements 0.87653
published_at 2026-04-07T12:55:00Z
4
value 0.03546
scoring_system epss
scoring_elements 0.87675
published_at 2026-04-08T12:55:00Z
5
value 0.03546
scoring_system epss
scoring_elements 0.87681
published_at 2026-04-09T12:55:00Z
6
value 0.03546
scoring_system epss
scoring_elements 0.87692
published_at 2026-04-11T12:55:00Z
7
value 0.03546
scoring_system epss
scoring_elements 0.87687
published_at 2026-04-12T12:55:00Z
8
value 0.03546
scoring_system epss
scoring_elements 0.87684
published_at 2026-04-13T12:55:00Z
9
value 0.03546
scoring_system epss
scoring_elements 0.87699
published_at 2026-04-16T12:55:00Z
10
value 0.03546
scoring_system epss
scoring_elements 0.877
published_at 2026-04-18T12:55:00Z
11
value 0.03546
scoring_system epss
scoring_elements 0.87696
published_at 2026-04-21T12:55:00Z
12
value 0.03546
scoring_system epss
scoring_elements 0.87715
published_at 2026-04-24T12:55:00Z
13
value 0.03546
scoring_system epss
scoring_elements 0.8772
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-6954
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6954
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0429
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0446
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0446
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0451
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0452
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0452
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0453
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0453
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0454
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0454
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0455
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0455
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0456
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0457
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0457
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0458
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0459
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0459
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0460
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0460
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0461
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0461
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1876
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1876
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2397
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2398
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2398
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2402
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2403
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2403
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2412
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2412
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2413
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2413
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2414
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2421
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2423
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2423
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2427
28
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1045561
reference_id 1045561
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=1045561
29
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127947.html
reference_id 127947.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/
url http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127947.html
30
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127952.html
reference_id 127952.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/
url http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127952.html
31
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128098.html
reference_id 128098.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/
url http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128098.html
32
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128099.html
reference_id 128099.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/
url http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128099.html
33
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128114.html
reference_id 128114.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/
url http://lists.fedoraproject.org/pipermail/package-announce/2014-February/128114.html
34
reference_url http://sourceforge.net/projects/libpng/files/libpng16/1.6.8/
reference_id 1.6.8
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/
url http://sourceforge.net/projects/libpng/files/libpng16/1.6.8/
35
reference_url http://sourceforge.net/p/libpng/code/ci/1faa6ff32c648acfe3cf30a58d31d7aebc24968c
reference_id 1faa6ff32c648acfe3cf30a58d31d7aebc24968c
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/
url http://sourceforge.net/p/libpng/code/ci/1faa6ff32c648acfe3cf30a58d31d7aebc24968c
36
reference_url http://secunia.com/advisories/58974
reference_id 58974
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/
url http://secunia.com/advisories/58974
37
reference_url http://secunia.com/advisories/59058
reference_id 59058
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/
url http://secunia.com/advisories/59058
38
reference_url http://www.securityfocus.com/bid/64493
reference_id 64493
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/
url http://www.securityfocus.com/bid/64493
39
reference_url http://www.kb.cert.org/vuls/id/650142
reference_id 650142
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/
url http://www.kb.cert.org/vuls/id/650142
40
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:035
reference_id advisories?name=MDVSA-2014:035
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:035
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-6954
reference_id CVE-2013-6954
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2013-6954
42
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21672080
reference_id docview.wss?uid=swg21672080
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/
url http://www-01.ibm.com/support/docview.wss?uid=swg21672080
43
reference_url https://www.ibm.com/support/docview.wss?uid=swg21675973
reference_id docview.wss?uid=swg21675973
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/
url https://www.ibm.com/support/docview.wss?uid=swg21675973
44
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21676746
reference_id docview.wss?uid=swg21676746
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/
url http://www-01.ibm.com/support/docview.wss?uid=swg21676746
45
reference_url https://security.gentoo.org/glsa/201406-32
reference_id GLSA-201406-32
reference_type
scores
url https://security.gentoo.org/glsa/201406-32
46
reference_url http://advisories.mageia.org/MGASA-2014-0075.html
reference_id MGASA-2014-0075.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/
url http://advisories.mageia.org/MGASA-2014-0075.html
47
reference_url http://lists.opensuse.org/opensuse-updates/2014-01/msg00071.html
reference_id msg00071.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/
url http://lists.opensuse.org/opensuse-updates/2014-01/msg00071.html
48
reference_url https://access.redhat.com/errata/RHSA-2014:0412
reference_id RHSA-2014:0412
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0412
49
reference_url https://access.redhat.com/errata/RHSA-2014:0413
reference_id RHSA-2014:0413
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-09T15:40:28Z/
url https://access.redhat.com/errata/RHSA-2014:0413
50
reference_url https://access.redhat.com/errata/RHSA-2014:0486
reference_id RHSA-2014:0486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0486
51
reference_url https://access.redhat.com/errata/RHSA-2014:0508
reference_id RHSA-2014:0508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0508
52
reference_url https://access.redhat.com/errata/RHSA-2014:0705
reference_id RHSA-2014:0705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0705
53
reference_url https://access.redhat.com/errata/RHSA-2014:0982
reference_id RHSA-2014:0982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0982
fixed_packages
0
url pkg:nuget/libpng@1.6.18.1
purl pkg:nuget/libpng@1.6.18.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1h1a-mpgm-w3hf
1
vulnerability VCID-8g2j-rqsk-zqfh
2
vulnerability VCID-cu24-1rcd-93g3
3
vulnerability VCID-zetn-zwnv-u7gf
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/libpng@1.6.18.1
aliases CVE-2013-6954
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-had5-3tnv-k3hm
3
url VCID-mxh6-rpb3-tbbq
vulnerability_id VCID-mxh6-rpb3-tbbq
summary
Improper Restriction of Operations within the Bounds of a Memory Buffer
Heap-based buffer overflow in the png_combine_row function in libpng, when running on systems, might allow context-dependent attackers to execute arbitrary code via a "very wide interlaced" PNG image.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9495.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-9495.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-9495
reference_id
reference_type
scores
0
value 0.03487
scoring_system epss
scoring_elements 0.87524
published_at 2026-04-01T12:55:00Z
1
value 0.03487
scoring_system epss
scoring_elements 0.87534
published_at 2026-04-02T12:55:00Z
2
value 0.03487
scoring_system epss
scoring_elements 0.87547
published_at 2026-04-04T12:55:00Z
3
value 0.03487
scoring_system epss
scoring_elements 0.87549
published_at 2026-04-07T12:55:00Z
4
value 0.03487
scoring_system epss
scoring_elements 0.87568
published_at 2026-04-08T12:55:00Z
5
value 0.03487
scoring_system epss
scoring_elements 0.87575
published_at 2026-04-09T12:55:00Z
6
value 0.03487
scoring_system epss
scoring_elements 0.87586
published_at 2026-04-11T12:55:00Z
7
value 0.03487
scoring_system epss
scoring_elements 0.87582
published_at 2026-04-12T12:55:00Z
8
value 0.03487
scoring_system epss
scoring_elements 0.87579
published_at 2026-04-13T12:55:00Z
9
value 0.03487
scoring_system epss
scoring_elements 0.87593
published_at 2026-04-16T12:55:00Z
10
value 0.03487
scoring_system epss
scoring_elements 0.87594
published_at 2026-04-18T12:55:00Z
11
value 0.03487
scoring_system epss
scoring_elements 0.87592
published_at 2026-04-21T12:55:00Z
12
value 0.03487
scoring_system epss
scoring_elements 0.8761
published_at 2026-04-24T12:55:00Z
13
value 0.03487
scoring_system epss
scoring_elements 0.87617
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-9495
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9495
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9495
3
reference_url http://www.openwall.com/lists/oss-security/2015/01/10/1
reference_id 1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:14:59Z/
url http://www.openwall.com/lists/oss-security/2015/01/10/1
4
reference_url http://www.securitytracker.com/id/1031444
reference_id 1031444
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:14:59Z/
url http://www.securitytracker.com/id/1031444
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1179186
reference_id 1179186
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1179186
6
reference_url http://www.openwall.com/lists/oss-security/2015/01/04/3
reference_id 3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:14:59Z/
url http://www.openwall.com/lists/oss-security/2015/01/04/3
7
reference_url http://www.openwall.com/lists/oss-security/2015/01/10/3
reference_id 3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:14:59Z/
url http://www.openwall.com/lists/oss-security/2015/01/10/3
8
reference_url http://sourceforge.net/p/png-mng/mailman/message/33172831/
reference_id 33172831
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:14:59Z/
url http://sourceforge.net/p/png-mng/mailman/message/33172831/
9
reference_url http://sourceforge.net/p/png-mng/mailman/message/33173461/
reference_id 33173461
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:14:59Z/
url http://sourceforge.net/p/png-mng/mailman/message/33173461/
10
reference_url http://secunia.com/advisories/62725
reference_id 62725
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:14:59Z/
url http://secunia.com/advisories/62725
11
reference_url http://www.securityfocus.com/bid/71820
reference_id 71820
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-09T15:14:59Z/
url http://www.securityfocus.com/bid/71820
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773823
reference_id 773823
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773823
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773824
reference_id 773824
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=773824
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-9495
reference_id CVE-2014-9495
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2014-9495
15
reference_url https://security.gentoo.org/glsa/201502-10
reference_id GLSA-201502-10
reference_type
scores
url https://security.gentoo.org/glsa/201502-10
fixed_packages
0
url pkg:nuget/libpng@1.6.18.1
purl pkg:nuget/libpng@1.6.18.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1h1a-mpgm-w3hf
1
vulnerability VCID-8g2j-rqsk-zqfh
2
vulnerability VCID-cu24-1rcd-93g3
3
vulnerability VCID-zetn-zwnv-u7gf
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/libpng@1.6.18.1
aliases CVE-2014-9495
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mxh6-rpb3-tbbq
4
url VCID-nhbw-6tpy-pbh3
vulnerability_id VCID-nhbw-6tpy-pbh3
summary
Uncontrolled Resource Consumption
The png_push_read_chunk function in pngpread.c in the progressive decoder in libpng allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an IDAT chunk with a length of zero.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0333.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0333.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0333
reference_id
reference_type
scores
0
value 0.00764
scoring_system epss
scoring_elements 0.73361
published_at 2026-04-01T12:55:00Z
1
value 0.00764
scoring_system epss
scoring_elements 0.73371
published_at 2026-04-02T12:55:00Z
2
value 0.00764
scoring_system epss
scoring_elements 0.73395
published_at 2026-04-04T12:55:00Z
3
value 0.00764
scoring_system epss
scoring_elements 0.73366
published_at 2026-04-07T12:55:00Z
4
value 0.00764
scoring_system epss
scoring_elements 0.73403
published_at 2026-04-08T12:55:00Z
5
value 0.00764
scoring_system epss
scoring_elements 0.73417
published_at 2026-04-09T12:55:00Z
6
value 0.00764
scoring_system epss
scoring_elements 0.7344
published_at 2026-04-11T12:55:00Z
7
value 0.00764
scoring_system epss
scoring_elements 0.7342
published_at 2026-04-12T12:55:00Z
8
value 0.00764
scoring_system epss
scoring_elements 0.73412
published_at 2026-04-13T12:55:00Z
9
value 0.00764
scoring_system epss
scoring_elements 0.73454
published_at 2026-04-16T12:55:00Z
10
value 0.00764
scoring_system epss
scoring_elements 0.73462
published_at 2026-04-18T12:55:00Z
11
value 0.00764
scoring_system epss
scoring_elements 0.73456
published_at 2026-04-21T12:55:00Z
12
value 0.00764
scoring_system epss
scoring_elements 0.73489
published_at 2026-04-24T12:55:00Z
13
value 0.00764
scoring_system epss
scoring_elements 0.73501
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0333
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0333
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1070985
reference_id 1070985
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1070985
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-0333
reference_id CVE-2014-0333
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2014-0333
5
reference_url https://security.gentoo.org/glsa/201408-06
reference_id GLSA-201408-06
reference_type
scores
url https://security.gentoo.org/glsa/201408-06
fixed_packages
0
url pkg:nuget/libpng@1.6.18.1
purl pkg:nuget/libpng@1.6.18.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1h1a-mpgm-w3hf
1
vulnerability VCID-8g2j-rqsk-zqfh
2
vulnerability VCID-cu24-1rcd-93g3
3
vulnerability VCID-zetn-zwnv-u7gf
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/libpng@1.6.18.1
aliases CVE-2014-0333
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nhbw-6tpy-pbh3
5
url VCID-vhp1-5zpy-rfdt
vulnerability_id VCID-vhp1-5zpy-rfdt
summary libpng: hardcoded value leads to heap-overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4214.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4214.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4214
reference_id
reference_type
scores
0
value 0.0013
scoring_system epss
scoring_elements 0.32438
published_at 2026-04-21T12:55:00Z
1
value 0.0013
scoring_system epss
scoring_elements 0.32583
published_at 2026-04-02T12:55:00Z
2
value 0.0013
scoring_system epss
scoring_elements 0.32619
published_at 2026-04-04T12:55:00Z
3
value 0.0013
scoring_system epss
scoring_elements 0.32442
published_at 2026-04-07T12:55:00Z
4
value 0.0013
scoring_system epss
scoring_elements 0.3249
published_at 2026-04-08T12:55:00Z
5
value 0.0013
scoring_system epss
scoring_elements 0.32518
published_at 2026-04-09T12:55:00Z
6
value 0.0013
scoring_system epss
scoring_elements 0.32457
published_at 2026-04-13T12:55:00Z
7
value 0.0013
scoring_system epss
scoring_elements 0.32492
published_at 2026-04-16T12:55:00Z
8
value 0.0013
scoring_system epss
scoring_elements 0.3247
published_at 2026-04-18T12:55:00Z
9
value 0.0013
scoring_system epss
scoring_elements 0.32521
published_at 2026-04-11T12:55:00Z
10
value 0.0013
scoring_system epss
scoring_elements 0.32483
published_at 2026-04-12T12:55:00Z
11
value 0.00233
scoring_system epss
scoring_elements 0.46145
published_at 2026-04-26T12:55:00Z
12
value 0.00233
scoring_system epss
scoring_elements 0.46137
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4214
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4214
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/glennrp/libpng/issues/302
reference_id
reference_type
scores
url https://github.com/glennrp/libpng/issues/302
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043393
reference_id 2043393
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043393
6
reference_url https://access.redhat.com/security/cve/CVE-2021-4214
reference_id CVE-2021-4214
reference_type
scores
url https://access.redhat.com/security/cve/CVE-2021-4214
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-4214
reference_id CVE-2021-4214
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-4214
8
reference_url https://security-tracker.debian.org/tracker/CVE-2021-4214
reference_id CVE-2021-4214
reference_type
scores
url https://security-tracker.debian.org/tracker/CVE-2021-4214
fixed_packages
0
url pkg:nuget/libpng@1.6.18.1
purl pkg:nuget/libpng@1.6.18.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1h1a-mpgm-w3hf
1
vulnerability VCID-8g2j-rqsk-zqfh
2
vulnerability VCID-cu24-1rcd-93g3
3
vulnerability VCID-zetn-zwnv-u7gf
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/libpng@1.6.18.1
aliases CVE-2021-4214
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vhp1-5zpy-rfdt
6
url VCID-zetn-zwnv-u7gf
vulnerability_id VCID-zetn-zwnv-u7gf
summary
NULL Pointer Dereference
The png_set_text_2 function in libpng  allows context-dependent attackers to cause a NULL pointer dereference vectors involving loading a text chunk into a png structure, removing the text, and then adding another text chunk to the structure.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10087.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-10087.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-10087
reference_id
reference_type
scores
0
value 0.00926
scoring_system epss
scoring_elements 0.75969
published_at 2026-04-01T12:55:00Z
1
value 0.00926
scoring_system epss
scoring_elements 0.76104
published_at 2026-04-26T12:55:00Z
2
value 0.00926
scoring_system epss
scoring_elements 0.76071
published_at 2026-04-18T12:55:00Z
3
value 0.00926
scoring_system epss
scoring_elements 0.76055
published_at 2026-04-21T12:55:00Z
4
value 0.00926
scoring_system epss
scoring_elements 0.76094
published_at 2026-04-24T12:55:00Z
5
value 0.00926
scoring_system epss
scoring_elements 0.75972
published_at 2026-04-02T12:55:00Z
6
value 0.00926
scoring_system epss
scoring_elements 0.76004
published_at 2026-04-04T12:55:00Z
7
value 0.00926
scoring_system epss
scoring_elements 0.75983
published_at 2026-04-07T12:55:00Z
8
value 0.00926
scoring_system epss
scoring_elements 0.76016
published_at 2026-04-08T12:55:00Z
9
value 0.00926
scoring_system epss
scoring_elements 0.76031
published_at 2026-04-09T12:55:00Z
10
value 0.00926
scoring_system epss
scoring_elements 0.76056
published_at 2026-04-11T12:55:00Z
11
value 0.00926
scoring_system epss
scoring_elements 0.76032
published_at 2026-04-12T12:55:00Z
12
value 0.00926
scoring_system epss
scoring_elements 0.76027
published_at 2026-04-13T12:55:00Z
13
value 0.00926
scoring_system epss
scoring_elements 0.76067
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-10087
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10087
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1409617
reference_id 1409617
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1409617
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849799
reference_id 849799
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=849799
6
reference_url https://security.archlinux.org/ASA-201701-2
reference_id ASA-201701-2
reference_type
scores
url https://security.archlinux.org/ASA-201701-2
7
reference_url https://security.archlinux.org/ASA-201701-5
reference_id ASA-201701-5
reference_type
scores
url https://security.archlinux.org/ASA-201701-5
8
reference_url https://security.archlinux.org/AVG-119
reference_id AVG-119
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-119
9
reference_url https://security.archlinux.org/AVG-120
reference_id AVG-120
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-120
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-10087
reference_id CVE-2016-10087
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2016-10087
11
reference_url https://security.gentoo.org/glsa/201701-74
reference_id GLSA-201701-74
reference_type
scores
url https://security.gentoo.org/glsa/201701-74
12
reference_url https://usn.ubuntu.com/3712-1/
reference_id USN-3712-1
reference_type
scores
url https://usn.ubuntu.com/3712-1/
13
reference_url https://usn.ubuntu.com/3712-2/
reference_id USN-3712-2
reference_type
scores
url https://usn.ubuntu.com/3712-2/
fixed_packages
0
url pkg:nuget/libpng@1.6.26.1
purl pkg:nuget/libpng@1.6.26.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8g2j-rqsk-zqfh
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/libpng@1.6.26.1
1
url pkg:nuget/libpng@1.6.28.1
purl pkg:nuget/libpng@1.6.28.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-8g2j-rqsk-zqfh
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/libpng@1.6.28.1
aliases CVE-2016-10087
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zetn-zwnv-u7gf
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:nuget/libpng@1.6.0