Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/gdk-pixbuf@0.17.0-2woody2
Typedeb
Namespacedebian
Namegdk-pixbuf
Version0.17.0-2woody2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.44.6+dfsg-2
Latest_non_vulnerable_version2.44.6+dfsg-2
Affected_by_vulnerabilities
0
url VCID-1jyr-kac3-2ua2
vulnerability_id VCID-1jyr-kac3-2ua2
summary
The GdkPixbuf library, that is also included in GTK+ 2, contains
    vulnerabilities that could lead to a Denial of Service or the execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2976.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2976.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-2976
reference_id
reference_type
scores
0
value 0.01719
scoring_system epss
scoring_elements 0.82424
published_at 2026-04-16T12:55:00Z
1
value 0.01719
scoring_system epss
scoring_elements 0.8232
published_at 2026-04-01T12:55:00Z
2
value 0.01719
scoring_system epss
scoring_elements 0.82334
published_at 2026-04-02T12:55:00Z
3
value 0.01719
scoring_system epss
scoring_elements 0.82352
published_at 2026-04-04T12:55:00Z
4
value 0.01719
scoring_system epss
scoring_elements 0.82346
published_at 2026-04-07T12:55:00Z
5
value 0.01719
scoring_system epss
scoring_elements 0.82373
published_at 2026-04-08T12:55:00Z
6
value 0.01719
scoring_system epss
scoring_elements 0.8238
published_at 2026-04-09T12:55:00Z
7
value 0.01719
scoring_system epss
scoring_elements 0.82399
published_at 2026-04-11T12:55:00Z
8
value 0.01719
scoring_system epss
scoring_elements 0.82396
published_at 2026-04-12T12:55:00Z
9
value 0.01719
scoring_system epss
scoring_elements 0.8239
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-2976
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2976
3
reference_url http://secunia.com/advisories/17522
reference_id
reference_type
scores
url http://secunia.com/advisories/17522
4
reference_url http://secunia.com/advisories/17538
reference_id
reference_type
scores
url http://secunia.com/advisories/17538
5
reference_url http://secunia.com/advisories/17562
reference_id
reference_type
scores
url http://secunia.com/advisories/17562
6
reference_url http://secunia.com/advisories/17592
reference_id
reference_type
scores
url http://secunia.com/advisories/17592
7
reference_url http://secunia.com/advisories/17594
reference_id
reference_type
scores
url http://secunia.com/advisories/17594
8
reference_url http://secunia.com/advisories/17615
reference_id
reference_type
scores
url http://secunia.com/advisories/17615
9
reference_url http://secunia.com/advisories/17657
reference_id
reference_type
scores
url http://secunia.com/advisories/17657
10
reference_url http://secunia.com/advisories/17710
reference_id
reference_type
scores
url http://secunia.com/advisories/17710
11
reference_url http://secunia.com/advisories/17770
reference_id
reference_type
scores
url http://secunia.com/advisories/17770
12
reference_url http://secunia.com/advisories/17791
reference_id
reference_type
scores
url http://secunia.com/advisories/17791
13
reference_url http://securitytracker.com/id?1015216
reference_id
reference_type
scores
url http://securitytracker.com/id?1015216
14
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11370
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11370
15
reference_url http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf
16
reference_url http://www.debian.org/security/2005/dsa-911
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-911
17
reference_url http://www.debian.org/security/2005/dsa-913
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-913
18
reference_url http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml
19
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:214
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:214
20
reference_url http://www.novell.com/linux/security/advisories/2005_65_gtk2.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_65_gtk2.html
21
reference_url http://www.redhat.com/support/errata/RHSA-2005-810.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-810.html
22
reference_url http://www.securityfocus.com/archive/1/428052/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/428052/100/0/threaded
23
reference_url http://www.securityfocus.com/bid/15428
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15428
24
reference_url http://www.ubuntu.com/usn/usn-216-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-216-1
25
reference_url http://www.vupen.com/english/advisories/2005/2433
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2433
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617772
reference_id 1617772
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617772
27
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431
reference_id 339431
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdkpixbuf:0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:0.22:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-2976
reference_id CVE-2005-2976
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-2976
31
reference_url https://security.gentoo.org/glsa/200511-14
reference_id GLSA-200511-14
reference_type
scores
url https://security.gentoo.org/glsa/200511-14
32
reference_url https://access.redhat.com/errata/RHSA-2005:810
reference_id RHSA-2005:810
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:810
33
reference_url https://usn.ubuntu.com/216-1/
reference_id USN-216-1
reference_type
scores
url https://usn.ubuntu.com/216-1/
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@0.22.0-11
purl pkg:deb/debian/gdk-pixbuf@0.22.0-11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ytk-9srj-zfff
1
vulnerability VCID-2a49-ryer-vkhd
2
vulnerability VCID-37b2-h2nn-ufa8
3
vulnerability VCID-4jf2-xww4-mfau
4
vulnerability VCID-4zm2-zv71-jfat
5
vulnerability VCID-7cp9-37h3-tkhq
6
vulnerability VCID-7hwy-9gdx-rya8
7
vulnerability VCID-drq5-6jps-skax
8
vulnerability VCID-hfkx-cat3-puf8
9
vulnerability VCID-juwv-p63q-8ffy
10
vulnerability VCID-jzz2-x2gk-8kf1
11
vulnerability VCID-k2ph-py3f-aycu
12
vulnerability VCID-ku5p-8cre-xkee
13
vulnerability VCID-pf79-yf2z-syem
14
vulnerability VCID-q8wp-65d8-yqcr
15
vulnerability VCID-qwv5-ntpt-mbbp
16
vulnerability VCID-rzj1-83cd-4yer
17
vulnerability VCID-syr2-zvtz-f3au
18
vulnerability VCID-v9xs-ur2x-jygb
19
vulnerability VCID-vcfh-3p9e-4uc3
20
vulnerability VCID-xg3j-c698-3kgu
21
vulnerability VCID-y1sm-7uec-1bc5
22
vulnerability VCID-zu3p-941y-nydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@0.22.0-11
aliases CVE-2005-2976
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1jyr-kac3-2ua2
1
url VCID-1ytk-9srj-zfff
vulnerability_id VCID-1ytk-9srj-zfff
summary gdk-pixbuf2: Integer overflow in tiff_image_parse function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2870.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2870.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-2870
reference_id
reference_type
scores
0
value 0.0313
scoring_system epss
scoring_elements 0.86799
published_at 2026-04-01T12:55:00Z
1
value 0.0313
scoring_system epss
scoring_elements 0.86873
published_at 2026-04-16T12:55:00Z
2
value 0.0313
scoring_system epss
scoring_elements 0.8686
published_at 2026-04-12T12:55:00Z
3
value 0.0313
scoring_system epss
scoring_elements 0.86855
published_at 2026-04-13T12:55:00Z
4
value 0.0313
scoring_system epss
scoring_elements 0.8681
published_at 2026-04-02T12:55:00Z
5
value 0.0313
scoring_system epss
scoring_elements 0.86829
published_at 2026-04-04T12:55:00Z
6
value 0.0313
scoring_system epss
scoring_elements 0.86823
published_at 2026-04-07T12:55:00Z
7
value 0.0313
scoring_system epss
scoring_elements 0.86843
published_at 2026-04-08T12:55:00Z
8
value 0.0313
scoring_system epss
scoring_elements 0.86851
published_at 2026-04-09T12:55:00Z
9
value 0.0313
scoring_system epss
scoring_elements 0.86864
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-2870
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2870
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1486735
reference_id 1486735
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1486735
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873787
reference_id 873787
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873787
6
reference_url https://usn.ubuntu.com/3418-1/
reference_id USN-3418-1
reference_type
scores
url https://usn.ubuntu.com/3418-1/
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@2.38.1%2Bdfsg-1
purl pkg:deb/debian/gdk-pixbuf@2.38.1%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2a49-ryer-vkhd
1
vulnerability VCID-4zm2-zv71-jfat
2
vulnerability VCID-juwv-p63q-8ffy
3
vulnerability VCID-jzz2-x2gk-8kf1
4
vulnerability VCID-pf79-yf2z-syem
5
vulnerability VCID-vcfh-3p9e-4uc3
6
vulnerability VCID-xg3j-c698-3kgu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.38.1%252Bdfsg-1
aliases CVE-2017-2870
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1ytk-9srj-zfff
2
url VCID-2a49-ryer-vkhd
vulnerability_id VCID-2a49-ryer-vkhd
summary
Out-of-bounds Write
GNOME gdk-pixbuf is vulnerable to a heap-buffer overflow vulnerability when decoding the lzw compressed stream of image data in GIF files with lzw minimum code size equals `12`
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44648.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44648.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-44648
reference_id
reference_type
scores
0
value 0.00153
scoring_system epss
scoring_elements 0.35934
published_at 2026-04-01T12:55:00Z
1
value 0.00153
scoring_system epss
scoring_elements 0.36125
published_at 2026-04-02T12:55:00Z
2
value 0.00153
scoring_system epss
scoring_elements 0.36155
published_at 2026-04-04T12:55:00Z
3
value 0.00153
scoring_system epss
scoring_elements 0.3599
published_at 2026-04-07T12:55:00Z
4
value 0.00153
scoring_system epss
scoring_elements 0.3604
published_at 2026-04-08T12:55:00Z
5
value 0.00153
scoring_system epss
scoring_elements 0.36062
published_at 2026-04-09T12:55:00Z
6
value 0.00153
scoring_system epss
scoring_elements 0.36069
published_at 2026-04-11T12:55:00Z
7
value 0.00153
scoring_system epss
scoring_elements 0.3603
published_at 2026-04-12T12:55:00Z
8
value 0.00153
scoring_system epss
scoring_elements 0.36004
published_at 2026-04-13T12:55:00Z
9
value 0.00153
scoring_system epss
scoring_elements 0.36044
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-44648
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46829
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136
6
reference_url https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/
reference_id
reference_type
scores
url https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014600
reference_id 1014600
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014600
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2043722
reference_id 2043722
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2043722
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-44648
reference_id CVE-2021-44648
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-44648
10
reference_url https://access.redhat.com/errata/RHSA-2023:2216
reference_id RHSA-2023:2216
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2216
11
reference_url https://usn.ubuntu.com/5607-1/
reference_id USN-5607-1
reference_type
scores
url https://usn.ubuntu.com/5607-1/
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2
purl pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-jzz2-x2gk-8kf1
1
vulnerability VCID-xg3j-c698-3kgu
2
vulnerability VCID-xg6z-9vh5-pbd6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2
aliases CVE-2021-44648
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2a49-ryer-vkhd
3
url VCID-37b2-h2nn-ufa8
vulnerability_id VCID-37b2-h2nn-ufa8
summary
Multiple vulnerabilities have been found in GDK-PixBuf, the worst
    of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6313.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6313.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6313
reference_id
reference_type
scores
0
value 0.00329
scoring_system epss
scoring_elements 0.55782
published_at 2026-04-01T12:55:00Z
1
value 0.00329
scoring_system epss
scoring_elements 0.55896
published_at 2026-04-07T12:55:00Z
2
value 0.00329
scoring_system epss
scoring_elements 0.55946
published_at 2026-04-08T12:55:00Z
3
value 0.00329
scoring_system epss
scoring_elements 0.55948
published_at 2026-04-09T12:55:00Z
4
value 0.00329
scoring_system epss
scoring_elements 0.55958
published_at 2026-04-11T12:55:00Z
5
value 0.00329
scoring_system epss
scoring_elements 0.55938
published_at 2026-04-12T12:55:00Z
6
value 0.00329
scoring_system epss
scoring_elements 0.55895
published_at 2026-04-02T12:55:00Z
7
value 0.00329
scoring_system epss
scoring_elements 0.55917
published_at 2026-04-04T12:55:00Z
8
value 0.00362
scoring_system epss
scoring_elements 0.58327
published_at 2026-04-13T12:55:00Z
9
value 0.00362
scoring_system epss
scoring_elements 0.58359
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6313
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6313
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1427217
reference_id 1427217
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1427217
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856445
reference_id 856445
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856445
6
reference_url https://security.gentoo.org/glsa/201709-08
reference_id GLSA-201709-08
reference_type
scores
url https://security.gentoo.org/glsa/201709-08
7
reference_url https://usn.ubuntu.com/3532-1/
reference_id USN-3532-1
reference_type
scores
url https://usn.ubuntu.com/3532-1/
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@2.38.1%2Bdfsg-1
purl pkg:deb/debian/gdk-pixbuf@2.38.1%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2a49-ryer-vkhd
1
vulnerability VCID-4zm2-zv71-jfat
2
vulnerability VCID-juwv-p63q-8ffy
3
vulnerability VCID-jzz2-x2gk-8kf1
4
vulnerability VCID-pf79-yf2z-syem
5
vulnerability VCID-vcfh-3p9e-4uc3
6
vulnerability VCID-xg3j-c698-3kgu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.38.1%252Bdfsg-1
aliases CVE-2017-6313
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-37b2-h2nn-ufa8
4
url VCID-3vjs-geuw-j7h7
vulnerability_id VCID-3vjs-geuw-j7h7
summary
The GdkPixbuf library, that is also included in GTK+ 2, contains
    vulnerabilities that could lead to a Denial of Service or the execution of
    arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2975.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2975.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-2975
reference_id
reference_type
scores
0
value 0.1189
scoring_system epss
scoring_elements 0.9376
published_at 2026-04-16T12:55:00Z
1
value 0.1189
scoring_system epss
scoring_elements 0.937
published_at 2026-04-01T12:55:00Z
2
value 0.1189
scoring_system epss
scoring_elements 0.9371
published_at 2026-04-02T12:55:00Z
3
value 0.1189
scoring_system epss
scoring_elements 0.9372
published_at 2026-04-04T12:55:00Z
4
value 0.1189
scoring_system epss
scoring_elements 0.93723
published_at 2026-04-07T12:55:00Z
5
value 0.1189
scoring_system epss
scoring_elements 0.93732
published_at 2026-04-08T12:55:00Z
6
value 0.1189
scoring_system epss
scoring_elements 0.93734
published_at 2026-04-09T12:55:00Z
7
value 0.1189
scoring_system epss
scoring_elements 0.93738
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-2975
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2975
3
reference_url http://secunia.com/advisories/17522
reference_id
reference_type
scores
url http://secunia.com/advisories/17522
4
reference_url http://secunia.com/advisories/17538
reference_id
reference_type
scores
url http://secunia.com/advisories/17538
5
reference_url http://secunia.com/advisories/17562
reference_id
reference_type
scores
url http://secunia.com/advisories/17562
6
reference_url http://secunia.com/advisories/17588
reference_id
reference_type
scores
url http://secunia.com/advisories/17588
7
reference_url http://secunia.com/advisories/17591
reference_id
reference_type
scores
url http://secunia.com/advisories/17591
8
reference_url http://secunia.com/advisories/17592
reference_id
reference_type
scores
url http://secunia.com/advisories/17592
9
reference_url http://secunia.com/advisories/17594
reference_id
reference_type
scores
url http://secunia.com/advisories/17594
10
reference_url http://secunia.com/advisories/17615
reference_id
reference_type
scores
url http://secunia.com/advisories/17615
11
reference_url http://secunia.com/advisories/17657
reference_id
reference_type
scores
url http://secunia.com/advisories/17657
12
reference_url http://secunia.com/advisories/17710
reference_id
reference_type
scores
url http://secunia.com/advisories/17710
13
reference_url http://secunia.com/advisories/17770
reference_id
reference_type
scores
url http://secunia.com/advisories/17770
14
reference_url http://secunia.com/advisories/17791
reference_id
reference_type
scores
url http://secunia.com/advisories/17791
15
reference_url http://securitytracker.com/id?1015216
reference_id
reference_type
scores
url http://securitytracker.com/id?1015216
16
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9697
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9697
17
reference_url http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf
18
reference_url http://www.debian.org/security/2005/dsa-911
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-911
19
reference_url http://www.debian.org/security/2005/dsa-913
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-913
20
reference_url http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml
21
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:214
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:214
22
reference_url http://www.novell.com/linux/security/advisories/2005_65_gtk2.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_65_gtk2.html
23
reference_url http://www.redhat.com/support/errata/RHSA-2005-810.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-810.html
24
reference_url http://www.redhat.com/support/errata/RHSA-2005-811.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-811.html
25
reference_url http://www.securityfocus.com/archive/1/428052/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/428052/100/0/threaded
26
reference_url http://www.securityfocus.com/bid/15429
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15429
27
reference_url http://www.ubuntu.com/usn/usn-216-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-216-1
28
reference_url http://www.vupen.com/english/advisories/2005/2433
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2433
29
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617771
reference_id 1617771
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617771
30
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431
reference_id 339431
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-2975
reference_id CVE-2005-2975
reference_type
scores
0
value 7.8
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2005-2975
34
reference_url https://security.gentoo.org/glsa/200511-14
reference_id GLSA-200511-14
reference_type
scores
url https://security.gentoo.org/glsa/200511-14
35
reference_url https://access.redhat.com/errata/RHSA-2005:810
reference_id RHSA-2005:810
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:810
36
reference_url https://access.redhat.com/errata/RHSA-2005:811
reference_id RHSA-2005:811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:811
37
reference_url https://usn.ubuntu.com/216-1/
reference_id USN-216-1
reference_type
scores
url https://usn.ubuntu.com/216-1/
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@0.22.0-11
purl pkg:deb/debian/gdk-pixbuf@0.22.0-11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ytk-9srj-zfff
1
vulnerability VCID-2a49-ryer-vkhd
2
vulnerability VCID-37b2-h2nn-ufa8
3
vulnerability VCID-4jf2-xww4-mfau
4
vulnerability VCID-4zm2-zv71-jfat
5
vulnerability VCID-7cp9-37h3-tkhq
6
vulnerability VCID-7hwy-9gdx-rya8
7
vulnerability VCID-drq5-6jps-skax
8
vulnerability VCID-hfkx-cat3-puf8
9
vulnerability VCID-juwv-p63q-8ffy
10
vulnerability VCID-jzz2-x2gk-8kf1
11
vulnerability VCID-k2ph-py3f-aycu
12
vulnerability VCID-ku5p-8cre-xkee
13
vulnerability VCID-pf79-yf2z-syem
14
vulnerability VCID-q8wp-65d8-yqcr
15
vulnerability VCID-qwv5-ntpt-mbbp
16
vulnerability VCID-rzj1-83cd-4yer
17
vulnerability VCID-syr2-zvtz-f3au
18
vulnerability VCID-v9xs-ur2x-jygb
19
vulnerability VCID-vcfh-3p9e-4uc3
20
vulnerability VCID-xg3j-c698-3kgu
21
vulnerability VCID-y1sm-7uec-1bc5
22
vulnerability VCID-zu3p-941y-nydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@0.22.0-11
aliases CVE-2005-2975
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3vjs-geuw-j7h7
5
url VCID-4jf2-xww4-mfau
vulnerability_id VCID-4jf2-xww4-mfau
summary
Multiple vulnerabilities have been found in GDK-PixBuf, the worst
    of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6312.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6312.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6312
reference_id
reference_type
scores
0
value 0.0031
scoring_system epss
scoring_elements 0.54102
published_at 2026-04-01T12:55:00Z
1
value 0.0031
scoring_system epss
scoring_elements 0.54119
published_at 2026-04-02T12:55:00Z
2
value 0.0031
scoring_system epss
scoring_elements 0.54149
published_at 2026-04-04T12:55:00Z
3
value 0.0031
scoring_system epss
scoring_elements 0.54124
published_at 2026-04-07T12:55:00Z
4
value 0.0031
scoring_system epss
scoring_elements 0.54176
published_at 2026-04-08T12:55:00Z
5
value 0.0031
scoring_system epss
scoring_elements 0.54174
published_at 2026-04-09T12:55:00Z
6
value 0.0031
scoring_system epss
scoring_elements 0.54223
published_at 2026-04-11T12:55:00Z
7
value 0.0031
scoring_system epss
scoring_elements 0.54205
published_at 2026-04-12T12:55:00Z
8
value 0.00324
scoring_system epss
scoring_elements 0.55513
published_at 2026-04-16T12:55:00Z
9
value 0.00324
scoring_system epss
scoring_elements 0.55477
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6312
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6312
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 1.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1427221
reference_id 1427221
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1427221
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856444
reference_id 856444
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856444
6
reference_url https://security.gentoo.org/glsa/201709-08
reference_id GLSA-201709-08
reference_type
scores
url https://security.gentoo.org/glsa/201709-08
7
reference_url https://usn.ubuntu.com/3532-1/
reference_id USN-3532-1
reference_type
scores
url https://usn.ubuntu.com/3532-1/
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@2.38.1%2Bdfsg-1
purl pkg:deb/debian/gdk-pixbuf@2.38.1%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2a49-ryer-vkhd
1
vulnerability VCID-4zm2-zv71-jfat
2
vulnerability VCID-juwv-p63q-8ffy
3
vulnerability VCID-jzz2-x2gk-8kf1
4
vulnerability VCID-pf79-yf2z-syem
5
vulnerability VCID-vcfh-3p9e-4uc3
6
vulnerability VCID-xg3j-c698-3kgu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.38.1%252Bdfsg-1
aliases CVE-2017-6312
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4jf2-xww4-mfau
6
url VCID-4zm2-zv71-jfat
vulnerability_id VCID-4zm2-zv71-jfat
summary
A vulnerability in GDK-PixBuf library could lead to a Denial of
    Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29385.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29385.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-29385
reference_id
reference_type
scores
0
value 0.00634
scoring_system epss
scoring_elements 0.70315
published_at 2026-04-01T12:55:00Z
1
value 0.00634
scoring_system epss
scoring_elements 0.70419
published_at 2026-04-16T12:55:00Z
2
value 0.00634
scoring_system epss
scoring_elements 0.70406
published_at 2026-04-11T12:55:00Z
3
value 0.00634
scoring_system epss
scoring_elements 0.70391
published_at 2026-04-12T12:55:00Z
4
value 0.00634
scoring_system epss
scoring_elements 0.70377
published_at 2026-04-13T12:55:00Z
5
value 0.00634
scoring_system epss
scoring_elements 0.70328
published_at 2026-04-02T12:55:00Z
6
value 0.00634
scoring_system epss
scoring_elements 0.70345
published_at 2026-04-04T12:55:00Z
7
value 0.00634
scoring_system epss
scoring_elements 0.70322
published_at 2026-04-07T12:55:00Z
8
value 0.00634
scoring_system epss
scoring_elements 0.70367
published_at 2026-04-08T12:55:00Z
9
value 0.00634
scoring_system epss
scoring_elements 0.70382
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-29385
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29385
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29385
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1927237
reference_id 1927237
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1927237
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977166
reference_id 977166
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977166
6
reference_url https://security.archlinux.org/ASA-202012-19
reference_id ASA-202012-19
reference_type
scores
url https://security.archlinux.org/ASA-202012-19
7
reference_url https://security.archlinux.org/ASA-202012-20
reference_id ASA-202012-20
reference_type
scores
url https://security.archlinux.org/ASA-202012-20
8
reference_url https://security.archlinux.org/AVG-1328
reference_id AVG-1328
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1328
9
reference_url https://security.archlinux.org/AVG-1329
reference_id AVG-1329
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1329
10
reference_url https://security.gentoo.org/glsa/202012-15
reference_id GLSA-202012-15
reference_type
scores
url https://security.gentoo.org/glsa/202012-15
11
reference_url https://usn.ubuntu.com/4663-1/
reference_id USN-4663-1
reference_type
scores
url https://usn.ubuntu.com/4663-1/
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2
purl pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-jzz2-x2gk-8kf1
1
vulnerability VCID-xg3j-c698-3kgu
2
vulnerability VCID-xg6z-9vh5-pbd6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2
aliases CVE-2020-29385
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4zm2-zv71-jfat
7
url VCID-7cp9-37h3-tkhq
vulnerability_id VCID-7cp9-37h3-tkhq
summary
Multiple vulnerabilities have been found in GDK-PixBuf, the worst
    of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6314.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6314.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6314
reference_id
reference_type
scores
0
value 0.00421
scoring_system epss
scoring_elements 0.6189
published_at 2026-04-01T12:55:00Z
1
value 0.00421
scoring_system epss
scoring_elements 0.61964
published_at 2026-04-07T12:55:00Z
2
value 0.00421
scoring_system epss
scoring_elements 0.62014
published_at 2026-04-08T12:55:00Z
3
value 0.00421
scoring_system epss
scoring_elements 0.62031
published_at 2026-04-09T12:55:00Z
4
value 0.00421
scoring_system epss
scoring_elements 0.62052
published_at 2026-04-11T12:55:00Z
5
value 0.00421
scoring_system epss
scoring_elements 0.62041
published_at 2026-04-12T12:55:00Z
6
value 0.00421
scoring_system epss
scoring_elements 0.61963
published_at 2026-04-02T12:55:00Z
7
value 0.00421
scoring_system epss
scoring_elements 0.61995
published_at 2026-04-04T12:55:00Z
8
value 0.0044
scoring_system epss
scoring_elements 0.63189
published_at 2026-04-13T12:55:00Z
9
value 0.0044
scoring_system epss
scoring_elements 0.63225
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6314
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6314
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6314
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1427218
reference_id 1427218
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1427218
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856448
reference_id 856448
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856448
6
reference_url https://security.gentoo.org/glsa/201709-08
reference_id GLSA-201709-08
reference_type
scores
url https://security.gentoo.org/glsa/201709-08
7
reference_url https://usn.ubuntu.com/3532-1/
reference_id USN-3532-1
reference_type
scores
url https://usn.ubuntu.com/3532-1/
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@2.38.1%2Bdfsg-1
purl pkg:deb/debian/gdk-pixbuf@2.38.1%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2a49-ryer-vkhd
1
vulnerability VCID-4zm2-zv71-jfat
2
vulnerability VCID-juwv-p63q-8ffy
3
vulnerability VCID-jzz2-x2gk-8kf1
4
vulnerability VCID-pf79-yf2z-syem
5
vulnerability VCID-vcfh-3p9e-4uc3
6
vulnerability VCID-xg3j-c698-3kgu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.38.1%252Bdfsg-1
aliases CVE-2017-6314
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7cp9-37h3-tkhq
8
url VCID-7hwy-9gdx-rya8
vulnerability_id VCID-7hwy-9gdx-rya8
summary gdk-pixbuf: heap-based overflow caused by invalid palette size
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12447.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12447.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12447
reference_id
reference_type
scores
0
value 0.00314
scoring_system epss
scoring_elements 0.54423
published_at 2026-04-01T12:55:00Z
1
value 0.00314
scoring_system epss
scoring_elements 0.54546
published_at 2026-04-16T12:55:00Z
2
value 0.00314
scoring_system epss
scoring_elements 0.54548
published_at 2026-04-11T12:55:00Z
3
value 0.00314
scoring_system epss
scoring_elements 0.5453
published_at 2026-04-12T12:55:00Z
4
value 0.00314
scoring_system epss
scoring_elements 0.54509
published_at 2026-04-13T12:55:00Z
5
value 0.00314
scoring_system epss
scoring_elements 0.54498
published_at 2026-04-02T12:55:00Z
6
value 0.00314
scoring_system epss
scoring_elements 0.54521
published_at 2026-04-04T12:55:00Z
7
value 0.00314
scoring_system epss
scoring_elements 0.5449
published_at 2026-04-07T12:55:00Z
8
value 0.00314
scoring_system epss
scoring_elements 0.54542
published_at 2026-04-08T12:55:00Z
9
value 0.00314
scoring_system epss
scoring_elements 0.54536
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12447
2
reference_url https://bugzilla.gnome.org/show_bug.cgi?id=785979
reference_id
reference_type
scores
url https://bugzilla.gnome.org/show_bug.cgi?id=785979
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12447
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/hackerlib/hackerlib-vul/tree/master/gnome
reference_id
reference_type
scores
url https://github.com/hackerlib/hackerlib-vul/tree/master/gnome
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1686828
reference_id 1686828
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1686828
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:2.32.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdk-pixbuf:2.32.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:2.32.2:*:*:*:*:*:*:*
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:nautilus:3.14.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:nautilus:3.14.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:nautilus:3.14.3:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-12447
reference_id CVE-2017-12447
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-12447
11
reference_url https://usn.ubuntu.com/3912-1/
reference_id USN-3912-1
reference_type
scores
url https://usn.ubuntu.com/3912-1/
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@2.36.5-2%2Bdeb9u2
purl pkg:deb/debian/gdk-pixbuf@2.36.5-2%2Bdeb9u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ytk-9srj-zfff
1
vulnerability VCID-2a49-ryer-vkhd
2
vulnerability VCID-37b2-h2nn-ufa8
3
vulnerability VCID-4jf2-xww4-mfau
4
vulnerability VCID-4zm2-zv71-jfat
5
vulnerability VCID-7cp9-37h3-tkhq
6
vulnerability VCID-juwv-p63q-8ffy
7
vulnerability VCID-jzz2-x2gk-8kf1
8
vulnerability VCID-pf79-yf2z-syem
9
vulnerability VCID-q8wp-65d8-yqcr
10
vulnerability VCID-vcfh-3p9e-4uc3
11
vulnerability VCID-xg3j-c698-3kgu
12
vulnerability VCID-y1sm-7uec-1bc5
13
vulnerability VCID-zu3p-941y-nydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.36.5-2%252Bdeb9u2
aliases CVE-2017-12447
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7hwy-9gdx-rya8
9
url VCID-drq5-6jps-skax
vulnerability_id VCID-drq5-6jps-skax
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4491.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4491.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4491
reference_id
reference_type
scores
0
value 0.04296
scoring_system epss
scoring_elements 0.88884
published_at 2026-04-16T12:55:00Z
1
value 0.04296
scoring_system epss
scoring_elements 0.88815
published_at 2026-04-01T12:55:00Z
2
value 0.04296
scoring_system epss
scoring_elements 0.88876
published_at 2026-04-11T12:55:00Z
3
value 0.04296
scoring_system epss
scoring_elements 0.88871
published_at 2026-04-13T12:55:00Z
4
value 0.04296
scoring_system epss
scoring_elements 0.88823
published_at 2026-04-02T12:55:00Z
5
value 0.04296
scoring_system epss
scoring_elements 0.88839
published_at 2026-04-04T12:55:00Z
6
value 0.04296
scoring_system epss
scoring_elements 0.88841
published_at 2026-04-07T12:55:00Z
7
value 0.04296
scoring_system epss
scoring_elements 0.88859
published_at 2026-04-08T12:55:00Z
8
value 0.04296
scoring_system epss
scoring_elements 0.88864
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4491
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1252290
reference_id 1252290
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1252290
5
reference_url https://security.gentoo.org/glsa/201512-05
reference_id GLSA-201512-05
reference_type
scores
url https://security.gentoo.org/glsa/201512-05
6
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-88
reference_id mfsa2015-88
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-88
8
reference_url https://access.redhat.com/errata/RHSA-2015:1586
reference_id RHSA-2015:1586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1586
9
reference_url https://access.redhat.com/errata/RHSA-2015:1682
reference_id RHSA-2015:1682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1682
10
reference_url https://access.redhat.com/errata/RHSA-2015:1694
reference_id RHSA-2015:1694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1694
11
reference_url https://usn.ubuntu.com/2702-1/
reference_id USN-2702-1
reference_type
scores
url https://usn.ubuntu.com/2702-1/
12
reference_url https://usn.ubuntu.com/2712-1/
reference_id USN-2712-1
reference_type
scores
url https://usn.ubuntu.com/2712-1/
13
reference_url https://usn.ubuntu.com/2722-1/
reference_id USN-2722-1
reference_type
scores
url https://usn.ubuntu.com/2722-1/
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@2.26.1-1%2Bdeb7u3
purl pkg:deb/debian/gdk-pixbuf@2.26.1-1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ytk-9srj-zfff
1
vulnerability VCID-2a49-ryer-vkhd
2
vulnerability VCID-37b2-h2nn-ufa8
3
vulnerability VCID-4jf2-xww4-mfau
4
vulnerability VCID-4zm2-zv71-jfat
5
vulnerability VCID-7cp9-37h3-tkhq
6
vulnerability VCID-7hwy-9gdx-rya8
7
vulnerability VCID-drq5-6jps-skax
8
vulnerability VCID-hfkx-cat3-puf8
9
vulnerability VCID-juwv-p63q-8ffy
10
vulnerability VCID-jzz2-x2gk-8kf1
11
vulnerability VCID-k2ph-py3f-aycu
12
vulnerability VCID-ku5p-8cre-xkee
13
vulnerability VCID-pf79-yf2z-syem
14
vulnerability VCID-q8wp-65d8-yqcr
15
vulnerability VCID-qwv5-ntpt-mbbp
16
vulnerability VCID-rzj1-83cd-4yer
17
vulnerability VCID-vcfh-3p9e-4uc3
18
vulnerability VCID-xg3j-c698-3kgu
19
vulnerability VCID-y1sm-7uec-1bc5
20
vulnerability VCID-zu3p-941y-nydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.26.1-1%252Bdeb7u3
1
url pkg:deb/debian/gdk-pixbuf@2.31.1-2%2Bdeb8u7
purl pkg:deb/debian/gdk-pixbuf@2.31.1-2%2Bdeb8u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ytk-9srj-zfff
1
vulnerability VCID-2a49-ryer-vkhd
2
vulnerability VCID-37b2-h2nn-ufa8
3
vulnerability VCID-4jf2-xww4-mfau
4
vulnerability VCID-4zm2-zv71-jfat
5
vulnerability VCID-7cp9-37h3-tkhq
6
vulnerability VCID-7hwy-9gdx-rya8
7
vulnerability VCID-drq5-6jps-skax
8
vulnerability VCID-hfkx-cat3-puf8
9
vulnerability VCID-juwv-p63q-8ffy
10
vulnerability VCID-jzz2-x2gk-8kf1
11
vulnerability VCID-k2ph-py3f-aycu
12
vulnerability VCID-ku5p-8cre-xkee
13
vulnerability VCID-pf79-yf2z-syem
14
vulnerability VCID-q8wp-65d8-yqcr
15
vulnerability VCID-qwv5-ntpt-mbbp
16
vulnerability VCID-rzj1-83cd-4yer
17
vulnerability VCID-vcfh-3p9e-4uc3
18
vulnerability VCID-xg3j-c698-3kgu
19
vulnerability VCID-y1sm-7uec-1bc5
20
vulnerability VCID-zu3p-941y-nydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.31.1-2%252Bdeb8u7
2
url pkg:deb/debian/gdk-pixbuf@2.36.5-2%2Bdeb9u2
purl pkg:deb/debian/gdk-pixbuf@2.36.5-2%2Bdeb9u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ytk-9srj-zfff
1
vulnerability VCID-2a49-ryer-vkhd
2
vulnerability VCID-37b2-h2nn-ufa8
3
vulnerability VCID-4jf2-xww4-mfau
4
vulnerability VCID-4zm2-zv71-jfat
5
vulnerability VCID-7cp9-37h3-tkhq
6
vulnerability VCID-juwv-p63q-8ffy
7
vulnerability VCID-jzz2-x2gk-8kf1
8
vulnerability VCID-pf79-yf2z-syem
9
vulnerability VCID-q8wp-65d8-yqcr
10
vulnerability VCID-vcfh-3p9e-4uc3
11
vulnerability VCID-xg3j-c698-3kgu
12
vulnerability VCID-y1sm-7uec-1bc5
13
vulnerability VCID-zu3p-941y-nydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.36.5-2%252Bdeb9u2
aliases CVE-2015-4491
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-drq5-6jps-skax
10
url VCID-ecuv-xp49-5yeh
vulnerability_id VCID-ecuv-xp49-5yeh
summary
The GdkPixbuf library, that is also included in GTK+ 2, contains
    vulnerabilities that could lead to a Denial of Service or the execution of
    arbitrary code.
references
0
reference_url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.8/SCOSA-2006.8.txt
reference_id
reference_type
scores
url ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.8/SCOSA-2006.8.txt
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3186.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3186.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-3186
reference_id
reference_type
scores
0
value 0.02224
scoring_system epss
scoring_elements 0.84533
published_at 2026-04-16T12:55:00Z
1
value 0.02224
scoring_system epss
scoring_elements 0.84439
published_at 2026-04-01T12:55:00Z
2
value 0.02224
scoring_system epss
scoring_elements 0.84454
published_at 2026-04-02T12:55:00Z
3
value 0.02224
scoring_system epss
scoring_elements 0.84474
published_at 2026-04-04T12:55:00Z
4
value 0.02224
scoring_system epss
scoring_elements 0.84476
published_at 2026-04-07T12:55:00Z
5
value 0.02224
scoring_system epss
scoring_elements 0.84497
published_at 2026-04-08T12:55:00Z
6
value 0.02224
scoring_system epss
scoring_elements 0.84503
published_at 2026-04-09T12:55:00Z
7
value 0.02224
scoring_system epss
scoring_elements 0.84521
published_at 2026-04-11T12:55:00Z
8
value 0.02224
scoring_system epss
scoring_elements 0.84516
published_at 2026-04-12T12:55:00Z
9
value 0.02224
scoring_system epss
scoring_elements 0.84512
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-3186
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3186
4
reference_url http://secunia.com/advisories/17522
reference_id
reference_type
scores
url http://secunia.com/advisories/17522
5
reference_url http://secunia.com/advisories/17538
reference_id
reference_type
scores
url http://secunia.com/advisories/17538
6
reference_url http://secunia.com/advisories/17562
reference_id
reference_type
scores
url http://secunia.com/advisories/17562
7
reference_url http://secunia.com/advisories/17588
reference_id
reference_type
scores
url http://secunia.com/advisories/17588
8
reference_url http://secunia.com/advisories/17591
reference_id
reference_type
scores
url http://secunia.com/advisories/17591
9
reference_url http://secunia.com/advisories/17592
reference_id
reference_type
scores
url http://secunia.com/advisories/17592
10
reference_url http://secunia.com/advisories/17594
reference_id
reference_type
scores
url http://secunia.com/advisories/17594
11
reference_url http://secunia.com/advisories/17615
reference_id
reference_type
scores
url http://secunia.com/advisories/17615
12
reference_url http://secunia.com/advisories/17657
reference_id
reference_type
scores
url http://secunia.com/advisories/17657
13
reference_url http://secunia.com/advisories/17710
reference_id
reference_type
scores
url http://secunia.com/advisories/17710
14
reference_url http://secunia.com/advisories/17770
reference_id
reference_type
scores
url http://secunia.com/advisories/17770
15
reference_url http://secunia.com/advisories/17791
reference_id
reference_type
scores
url http://secunia.com/advisories/17791
16
reference_url http://secunia.com/advisories/18509
reference_id
reference_type
scores
url http://secunia.com/advisories/18509
17
reference_url http://securityreason.com/securityalert/188
reference_id
reference_type
scores
url http://securityreason.com/securityalert/188
18
reference_url http://securitytracker.com/id?1015216
reference_id
reference_type
scores
url http://securitytracker.com/id?1015216
19
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9503
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9503
20
reference_url http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf
21
reference_url http://www.debian.org/security/2005/dsa-911
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-911
22
reference_url http://www.debian.org/security/2005/dsa-913
reference_id
reference_type
scores
url http://www.debian.org/security/2005/dsa-913
23
reference_url http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml
reference_id
reference_type
scores
url http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml
24
reference_url http://www.idefense.com/application/poi/display?id=339&type=vulnerabilities
reference_id
reference_type
scores
url http://www.idefense.com/application/poi/display?id=339&type=vulnerabilities
25
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:214
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:214
26
reference_url http://www.novell.com/linux/security/advisories/2005_65_gtk2.html
reference_id
reference_type
scores
url http://www.novell.com/linux/security/advisories/2005_65_gtk2.html
27
reference_url http://www.redhat.com/support/errata/RHSA-2005-810.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-810.html
28
reference_url http://www.redhat.com/support/errata/RHSA-2005-811.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-811.html
29
reference_url http://www.securityfocus.com/archive/1/428052/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/428052/100/0/threaded
30
reference_url http://www.securityfocus.com/bid/15435
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/15435
31
reference_url http://www.ubuntu.com/usn/usn-216-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-216-1
32
reference_url http://www.vupen.com/english/advisories/2005/2433
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2005/2433
33
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617795
reference_id 1617795
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617795
34
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431
reference_id 339431
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gtk:gtk\+:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gtk:gtk\+:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gtk:gtk\+:2.4.0:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-3186
reference_id CVE-2005-3186
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2005-3186
38
reference_url https://security.gentoo.org/glsa/200511-14
reference_id GLSA-200511-14
reference_type
scores
url https://security.gentoo.org/glsa/200511-14
39
reference_url https://access.redhat.com/errata/RHSA-2005:810
reference_id RHSA-2005:810
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:810
40
reference_url https://access.redhat.com/errata/RHSA-2005:811
reference_id RHSA-2005:811
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:811
41
reference_url https://usn.ubuntu.com/216-1/
reference_id USN-216-1
reference_type
scores
url https://usn.ubuntu.com/216-1/
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@0.22.0-11
purl pkg:deb/debian/gdk-pixbuf@0.22.0-11
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ytk-9srj-zfff
1
vulnerability VCID-2a49-ryer-vkhd
2
vulnerability VCID-37b2-h2nn-ufa8
3
vulnerability VCID-4jf2-xww4-mfau
4
vulnerability VCID-4zm2-zv71-jfat
5
vulnerability VCID-7cp9-37h3-tkhq
6
vulnerability VCID-7hwy-9gdx-rya8
7
vulnerability VCID-drq5-6jps-skax
8
vulnerability VCID-hfkx-cat3-puf8
9
vulnerability VCID-juwv-p63q-8ffy
10
vulnerability VCID-jzz2-x2gk-8kf1
11
vulnerability VCID-k2ph-py3f-aycu
12
vulnerability VCID-ku5p-8cre-xkee
13
vulnerability VCID-pf79-yf2z-syem
14
vulnerability VCID-q8wp-65d8-yqcr
15
vulnerability VCID-qwv5-ntpt-mbbp
16
vulnerability VCID-rzj1-83cd-4yer
17
vulnerability VCID-syr2-zvtz-f3au
18
vulnerability VCID-v9xs-ur2x-jygb
19
vulnerability VCID-vcfh-3p9e-4uc3
20
vulnerability VCID-xg3j-c698-3kgu
21
vulnerability VCID-y1sm-7uec-1bc5
22
vulnerability VCID-zu3p-941y-nydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@0.22.0-11
aliases CVE-2005-3186
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ecuv-xp49-5yeh
11
url VCID-epbu-y9uy-83bs
vulnerability_id VCID-epbu-y9uy-83bs
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0782.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0782.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0782
reference_id
reference_type
scores
0
value 0.30045
scoring_system epss
scoring_elements 0.96626
published_at 2026-04-01T12:55:00Z
1
value 0.30045
scoring_system epss
scoring_elements 0.96635
published_at 2026-04-02T12:55:00Z
2
value 0.30045
scoring_system epss
scoring_elements 0.9664
published_at 2026-04-04T12:55:00Z
3
value 0.30045
scoring_system epss
scoring_elements 0.96644
published_at 2026-04-07T12:55:00Z
4
value 0.30045
scoring_system epss
scoring_elements 0.96652
published_at 2026-04-08T12:55:00Z
5
value 0.30045
scoring_system epss
scoring_elements 0.96654
published_at 2026-04-09T12:55:00Z
6
value 0.30045
scoring_system epss
scoring_elements 0.96656
published_at 2026-04-12T12:55:00Z
7
value 0.30045
scoring_system epss
scoring_elements 0.96659
published_at 2026-04-13T12:55:00Z
8
value 0.30045
scoring_system epss
scoring_elements 0.96666
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0782
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0782
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617283
reference_id 1617283
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617283
4
reference_url https://access.redhat.com/errata/RHSA-2004:447
reference_id RHSA-2004:447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:447
5
reference_url https://access.redhat.com/errata/RHSA-2004:466
reference_id RHSA-2004:466
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:466
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@0.22.0-8.1
purl pkg:deb/debian/gdk-pixbuf@0.22.0-8.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1jyr-kac3-2ua2
1
vulnerability VCID-1ytk-9srj-zfff
2
vulnerability VCID-2a49-ryer-vkhd
3
vulnerability VCID-37b2-h2nn-ufa8
4
vulnerability VCID-3vjs-geuw-j7h7
5
vulnerability VCID-4jf2-xww4-mfau
6
vulnerability VCID-4zm2-zv71-jfat
7
vulnerability VCID-7cp9-37h3-tkhq
8
vulnerability VCID-7hwy-9gdx-rya8
9
vulnerability VCID-drq5-6jps-skax
10
vulnerability VCID-ecuv-xp49-5yeh
11
vulnerability VCID-hfkx-cat3-puf8
12
vulnerability VCID-juwv-p63q-8ffy
13
vulnerability VCID-jzz2-x2gk-8kf1
14
vulnerability VCID-k2ph-py3f-aycu
15
vulnerability VCID-ku5p-8cre-xkee
16
vulnerability VCID-pf79-yf2z-syem
17
vulnerability VCID-q8wp-65d8-yqcr
18
vulnerability VCID-qwv5-ntpt-mbbp
19
vulnerability VCID-rzj1-83cd-4yer
20
vulnerability VCID-syr2-zvtz-f3au
21
vulnerability VCID-v9xs-ur2x-jygb
22
vulnerability VCID-vcfh-3p9e-4uc3
23
vulnerability VCID-xg3j-c698-3kgu
24
vulnerability VCID-y1sm-7uec-1bc5
25
vulnerability VCID-zu3p-941y-nydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@0.22.0-8.1
aliases CVE-2004-0782
risk_score 0.1
exploitability 0.5
weighted_severity 0.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-epbu-y9uy-83bs
12
url VCID-hfkx-cat3-puf8
vulnerability_id VCID-hfkx-cat3-puf8
summary gdk-pixbuf: Out-of-bounds write in OneLine32() function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6352.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6352.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-6352
reference_id
reference_type
scores
0
value 0.01556
scoring_system epss
scoring_elements 0.81387
published_at 2026-04-01T12:55:00Z
1
value 0.01556
scoring_system epss
scoring_elements 0.8149
published_at 2026-04-16T12:55:00Z
2
value 0.01556
scoring_system epss
scoring_elements 0.81473
published_at 2026-04-11T12:55:00Z
3
value 0.01556
scoring_system epss
scoring_elements 0.8146
published_at 2026-04-12T12:55:00Z
4
value 0.01556
scoring_system epss
scoring_elements 0.81453
published_at 2026-04-13T12:55:00Z
5
value 0.01556
scoring_system epss
scoring_elements 0.81396
published_at 2026-04-02T12:55:00Z
6
value 0.01556
scoring_system epss
scoring_elements 0.81419
published_at 2026-04-04T12:55:00Z
7
value 0.01556
scoring_system epss
scoring_elements 0.81418
published_at 2026-04-07T12:55:00Z
8
value 0.01556
scoring_system epss
scoring_elements 0.81446
published_at 2026-04-08T12:55:00Z
9
value 0.01556
scoring_system epss
scoring_elements 0.81451
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-6352
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6352
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1349751
reference_id 1349751
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1349751
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832496
reference_id 832496
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832496
6
reference_url https://security.archlinux.org/ASA-201610-9
reference_id ASA-201610-9
reference_type
scores
url https://security.archlinux.org/ASA-201610-9
7
reference_url https://security.archlinux.org/ASA-201611-12
reference_id ASA-201611-12
reference_type
scores
url https://security.archlinux.org/ASA-201611-12
8
reference_url https://security.archlinux.org/AVG-1
reference_id AVG-1
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1
9
reference_url https://security.archlinux.org/AVG-2
reference_id AVG-2
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2
10
reference_url https://usn.ubuntu.com/3085-1/
reference_id USN-3085-1
reference_type
scores
url https://usn.ubuntu.com/3085-1/
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@2.36.5-2%2Bdeb9u2
purl pkg:deb/debian/gdk-pixbuf@2.36.5-2%2Bdeb9u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ytk-9srj-zfff
1
vulnerability VCID-2a49-ryer-vkhd
2
vulnerability VCID-37b2-h2nn-ufa8
3
vulnerability VCID-4jf2-xww4-mfau
4
vulnerability VCID-4zm2-zv71-jfat
5
vulnerability VCID-7cp9-37h3-tkhq
6
vulnerability VCID-juwv-p63q-8ffy
7
vulnerability VCID-jzz2-x2gk-8kf1
8
vulnerability VCID-pf79-yf2z-syem
9
vulnerability VCID-q8wp-65d8-yqcr
10
vulnerability VCID-vcfh-3p9e-4uc3
11
vulnerability VCID-xg3j-c698-3kgu
12
vulnerability VCID-y1sm-7uec-1bc5
13
vulnerability VCID-zu3p-941y-nydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.36.5-2%252Bdeb9u2
aliases CVE-2016-6352
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hfkx-cat3-puf8
13
url VCID-juwv-p63q-8ffy
vulnerability_id VCID-juwv-p63q-8ffy
summary gdk-pixbuf: heap-based buffer overflow when compositing or clearing frames in GIF files
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46829.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46829.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-46829
reference_id
reference_type
scores
0
value 0.00425
scoring_system epss
scoring_elements 0.62096
published_at 2026-04-01T12:55:00Z
1
value 0.00425
scoring_system epss
scoring_elements 0.62255
published_at 2026-04-16T12:55:00Z
2
value 0.00425
scoring_system epss
scoring_elements 0.6223
published_at 2026-04-12T12:55:00Z
3
value 0.00425
scoring_system epss
scoring_elements 0.62209
published_at 2026-04-13T12:55:00Z
4
value 0.00425
scoring_system epss
scoring_elements 0.62157
published_at 2026-04-02T12:55:00Z
5
value 0.00425
scoring_system epss
scoring_elements 0.62187
published_at 2026-04-04T12:55:00Z
6
value 0.00425
scoring_system epss
scoring_elements 0.62155
published_at 2026-04-07T12:55:00Z
7
value 0.00425
scoring_system epss
scoring_elements 0.62205
published_at 2026-04-08T12:55:00Z
8
value 0.00425
scoring_system epss
scoring_elements 0.62223
published_at 2026-04-09T12:55:00Z
9
value 0.00425
scoring_system epss
scoring_elements 0.62241
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-46829
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46829
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2114940
reference_id 2114940
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2114940
6
reference_url https://security.archlinux.org/AVG-2786
reference_id AVG-2786
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2786
7
reference_url https://access.redhat.com/errata/RHSA-2023:2216
reference_id RHSA-2023:2216
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2216
8
reference_url https://usn.ubuntu.com/5554-1/
reference_id USN-5554-1
reference_type
scores
url https://usn.ubuntu.com/5554-1/
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2
purl pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-jzz2-x2gk-8kf1
1
vulnerability VCID-xg3j-c698-3kgu
2
vulnerability VCID-xg6z-9vh5-pbd6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2
aliases CVE-2021-46829
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-juwv-p63q-8ffy
14
url VCID-juz2-dgbr-4bd7
vulnerability_id VCID-juz2-dgbr-4bd7
summary security flaw
references
0
reference_url http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000958
reference_id
reference_type
scores
url http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000958
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0891.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0891.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2005-0891
reference_id
reference_type
scores
0
value 0.02026
scoring_system epss
scoring_elements 0.83815
published_at 2026-04-16T12:55:00Z
1
value 0.02026
scoring_system epss
scoring_elements 0.83786
published_at 2026-04-12T12:55:00Z
2
value 0.02026
scoring_system epss
scoring_elements 0.83782
published_at 2026-04-13T12:55:00Z
3
value 0.02026
scoring_system epss
scoring_elements 0.83716
published_at 2026-04-01T12:55:00Z
4
value 0.02026
scoring_system epss
scoring_elements 0.83729
published_at 2026-04-02T12:55:00Z
5
value 0.02026
scoring_system epss
scoring_elements 0.83743
published_at 2026-04-04T12:55:00Z
6
value 0.02026
scoring_system epss
scoring_elements 0.83746
published_at 2026-04-07T12:55:00Z
7
value 0.02026
scoring_system epss
scoring_elements 0.8377
published_at 2026-04-08T12:55:00Z
8
value 0.02026
scoring_system epss
scoring_elements 0.83776
published_at 2026-04-09T12:55:00Z
9
value 0.02026
scoring_system epss
scoring_elements 0.83792
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2005-0891
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0891
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0891
4
reference_url http://secunia.com/advisories/17657
reference_id
reference_type
scores
url http://secunia.com/advisories/17657
5
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9710
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9710
6
reference_url http://www.mandriva.com/security/advisories?name=MDKSA-2005:214
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDKSA-2005:214
7
reference_url http://www.redhat.com/support/errata/RHSA-2005-343.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-343.html
8
reference_url http://www.redhat.com/support/errata/RHSA-2005-344.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2005-344.html
9
reference_url http://www.securityfocus.com/archive/1/419771/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/419771/100/0/threaded
10
reference_url http://www.securityfocus.com/bid/12950
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/12950
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617587
reference_id 1617587
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617587
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2005-0891
reference_id CVE-2005-0891
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2005-0891
14
reference_url https://access.redhat.com/errata/RHSA-2005:343
reference_id RHSA-2005:343
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:343
15
reference_url https://access.redhat.com/errata/RHSA-2005:344
reference_id RHSA-2005:344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2005:344
16
reference_url https://usn.ubuntu.com/108-1/
reference_id USN-108-1
reference_type
scores
url https://usn.ubuntu.com/108-1/
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@0.22.0-8.1
purl pkg:deb/debian/gdk-pixbuf@0.22.0-8.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1jyr-kac3-2ua2
1
vulnerability VCID-1ytk-9srj-zfff
2
vulnerability VCID-2a49-ryer-vkhd
3
vulnerability VCID-37b2-h2nn-ufa8
4
vulnerability VCID-3vjs-geuw-j7h7
5
vulnerability VCID-4jf2-xww4-mfau
6
vulnerability VCID-4zm2-zv71-jfat
7
vulnerability VCID-7cp9-37h3-tkhq
8
vulnerability VCID-7hwy-9gdx-rya8
9
vulnerability VCID-drq5-6jps-skax
10
vulnerability VCID-ecuv-xp49-5yeh
11
vulnerability VCID-hfkx-cat3-puf8
12
vulnerability VCID-juwv-p63q-8ffy
13
vulnerability VCID-jzz2-x2gk-8kf1
14
vulnerability VCID-k2ph-py3f-aycu
15
vulnerability VCID-ku5p-8cre-xkee
16
vulnerability VCID-pf79-yf2z-syem
17
vulnerability VCID-q8wp-65d8-yqcr
18
vulnerability VCID-qwv5-ntpt-mbbp
19
vulnerability VCID-rzj1-83cd-4yer
20
vulnerability VCID-syr2-zvtz-f3au
21
vulnerability VCID-v9xs-ur2x-jygb
22
vulnerability VCID-vcfh-3p9e-4uc3
23
vulnerability VCID-xg3j-c698-3kgu
24
vulnerability VCID-y1sm-7uec-1bc5
25
vulnerability VCID-zu3p-941y-nydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@0.22.0-8.1
aliases CVE-2005-0891
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-juz2-dgbr-4bd7
15
url VCID-jzz2-x2gk-8kf1
vulnerability_id VCID-jzz2-x2gk-8kf1
summary gdk‑pixbuf: Heap‑buffer‑overflow in gdk‑pixbuf
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-7345.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-7345.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-7345
reference_id
reference_type
scores
0
value 0.00375
scoring_system epss
scoring_elements 0.59087
published_at 2026-04-02T12:55:00Z
1
value 0.00417
scoring_system epss
scoring_elements 0.61801
published_at 2026-04-16T12:55:00Z
2
value 0.00417
scoring_system epss
scoring_elements 0.61753
published_at 2026-04-08T12:55:00Z
3
value 0.00417
scoring_system epss
scoring_elements 0.61768
published_at 2026-04-09T12:55:00Z
4
value 0.00417
scoring_system epss
scoring_elements 0.61789
published_at 2026-04-11T12:55:00Z
5
value 0.00417
scoring_system epss
scoring_elements 0.61777
published_at 2026-04-12T12:55:00Z
6
value 0.00417
scoring_system epss
scoring_elements 0.61758
published_at 2026-04-13T12:55:00Z
7
value 0.00417
scoring_system epss
scoring_elements 0.61733
published_at 2026-04-04T12:55:00Z
8
value 0.00417
scoring_system epss
scoring_elements 0.61704
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-7345
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7345
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109262
reference_id 1109262
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109262
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2377063
reference_id 2377063
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:53:14Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2377063
6
reference_url https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/249
reference_id 249
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:53:14Z/
url https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/249
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_id cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos
reference_id cpe:/o:redhat:rhel_tus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos
33
reference_url https://access.redhat.com/security/cve/CVE-2025-7345
reference_id CVE-2025-7345
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:53:14Z/
url https://access.redhat.com/security/cve/CVE-2025-7345
34
reference_url https://access.redhat.com/errata/RHSA-2025:12841
reference_id RHSA-2025:12841
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:53:14Z/
url https://access.redhat.com/errata/RHSA-2025:12841
35
reference_url https://access.redhat.com/errata/RHSA-2025:12862
reference_id RHSA-2025:12862
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:53:14Z/
url https://access.redhat.com/errata/RHSA-2025:12862
36
reference_url https://access.redhat.com/errata/RHSA-2025:13315
reference_id RHSA-2025:13315
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:53:14Z/
url https://access.redhat.com/errata/RHSA-2025:13315
37
reference_url https://access.redhat.com/errata/RHSA-2025:14574
reference_id RHSA-2025:14574
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:53:14Z/
url https://access.redhat.com/errata/RHSA-2025:14574
38
reference_url https://access.redhat.com/errata/RHSA-2025:14575
reference_id RHSA-2025:14575
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:53:14Z/
url https://access.redhat.com/errata/RHSA-2025:14575
39
reference_url https://access.redhat.com/errata/RHSA-2025:14576
reference_id RHSA-2025:14576
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:53:14Z/
url https://access.redhat.com/errata/RHSA-2025:14576
40
reference_url https://access.redhat.com/errata/RHSA-2025:14585
reference_id RHSA-2025:14585
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:53:14Z/
url https://access.redhat.com/errata/RHSA-2025:14585
41
reference_url https://access.redhat.com/errata/RHSA-2025:14618
reference_id RHSA-2025:14618
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:53:14Z/
url https://access.redhat.com/errata/RHSA-2025:14618
42
reference_url https://access.redhat.com/errata/RHSA-2025:14646
reference_id RHSA-2025:14646
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:53:14Z/
url https://access.redhat.com/errata/RHSA-2025:14646
43
reference_url https://access.redhat.com/errata/RHSA-2025:14647
reference_id RHSA-2025:14647
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:53:14Z/
url https://access.redhat.com/errata/RHSA-2025:14647
44
reference_url https://access.redhat.com/errata/RHSA-2025:14683
reference_id RHSA-2025:14683
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:53:14Z/
url https://access.redhat.com/errata/RHSA-2025:14683
45
reference_url https://usn.ubuntu.com/7662-1/
reference_id USN-7662-1
reference_type
scores
url https://usn.ubuntu.com/7662-1/
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3
purl pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-xg6z-9vh5-pbd6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3
aliases CVE-2025-7345
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jzz2-x2gk-8kf1
16
url VCID-k2ph-py3f-aycu
vulnerability_id VCID-k2ph-py3f-aycu
summary
Multiple buffer overflow vulnerabilities in gdk-pixbuf may allow
    remote attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url http://ftp.gnome.org/pub/gnome/sources/gdk-pixbuf/2.32/gdk-pixbuf-2.32.0.news
reference_id
reference_type
scores
url http://ftp.gnome.org/pub/gnome/sources/gdk-pixbuf/2.32/gdk-pixbuf-2.32.0.news
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7673.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7673.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7673
reference_id
reference_type
scores
0
value 0.02374
scoring_system epss
scoring_elements 0.84988
published_at 2026-04-16T12:55:00Z
1
value 0.02374
scoring_system epss
scoring_elements 0.84889
published_at 2026-04-01T12:55:00Z
2
value 0.02374
scoring_system epss
scoring_elements 0.84905
published_at 2026-04-02T12:55:00Z
3
value 0.02374
scoring_system epss
scoring_elements 0.84923
published_at 2026-04-04T12:55:00Z
4
value 0.02374
scoring_system epss
scoring_elements 0.84927
published_at 2026-04-07T12:55:00Z
5
value 0.02374
scoring_system epss
scoring_elements 0.8495
published_at 2026-04-08T12:55:00Z
6
value 0.02374
scoring_system epss
scoring_elements 0.84957
published_at 2026-04-09T12:55:00Z
7
value 0.02374
scoring_system epss
scoring_elements 0.84973
published_at 2026-04-11T12:55:00Z
8
value 0.02374
scoring_system epss
scoring_elements 0.84972
published_at 2026-04-12T12:55:00Z
9
value 0.02374
scoring_system epss
scoring_elements 0.84967
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7673
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674
7
reference_url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=19f9685dbff7d1f929c61cf99188df917a18811d
reference_id
reference_type
scores
url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=19f9685dbff7d1f929c61cf99188df917a18811d
8
reference_url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=6ddca835100107e6b5841ce9d56074f6d98c387e
reference_id
reference_type
scores
url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=6ddca835100107e6b5841ce9d56074f6d98c387e
9
reference_url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=edf6fb8d856574bc3bb3a703037f56533229267c
reference_id
reference_type
scores
url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=edf6fb8d856574bc3bb3a703037f56533229267c
10
reference_url http://www.debian.org/security/2015/dsa-3378
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3378
11
reference_url http://www.openwall.com/lists/oss-security/2015/10/01/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/10/01/3
12
reference_url http://www.openwall.com/lists/oss-security/2015/10/02/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/10/02/9
13
reference_url http://www.securityfocus.com/bid/76953
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/76953
14
reference_url http://www.ubuntu.com/usn/USN-2767-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2767-1
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1261836
reference_id 1261836
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1261836
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7673
reference_id CVE-2015-7673
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7673
19
reference_url https://security.gentoo.org/glsa/201512-05
reference_id GLSA-201512-05
reference_type
scores
url https://security.gentoo.org/glsa/201512-05
20
reference_url https://usn.ubuntu.com/2767-1/
reference_id USN-2767-1
reference_type
scores
url https://usn.ubuntu.com/2767-1/
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@2.26.1-1%2Bdeb7u3
purl pkg:deb/debian/gdk-pixbuf@2.26.1-1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ytk-9srj-zfff
1
vulnerability VCID-2a49-ryer-vkhd
2
vulnerability VCID-37b2-h2nn-ufa8
3
vulnerability VCID-4jf2-xww4-mfau
4
vulnerability VCID-4zm2-zv71-jfat
5
vulnerability VCID-7cp9-37h3-tkhq
6
vulnerability VCID-7hwy-9gdx-rya8
7
vulnerability VCID-drq5-6jps-skax
8
vulnerability VCID-hfkx-cat3-puf8
9
vulnerability VCID-juwv-p63q-8ffy
10
vulnerability VCID-jzz2-x2gk-8kf1
11
vulnerability VCID-k2ph-py3f-aycu
12
vulnerability VCID-ku5p-8cre-xkee
13
vulnerability VCID-pf79-yf2z-syem
14
vulnerability VCID-q8wp-65d8-yqcr
15
vulnerability VCID-qwv5-ntpt-mbbp
16
vulnerability VCID-rzj1-83cd-4yer
17
vulnerability VCID-vcfh-3p9e-4uc3
18
vulnerability VCID-xg3j-c698-3kgu
19
vulnerability VCID-y1sm-7uec-1bc5
20
vulnerability VCID-zu3p-941y-nydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.26.1-1%252Bdeb7u3
1
url pkg:deb/debian/gdk-pixbuf@2.31.1-2%2Bdeb8u7
purl pkg:deb/debian/gdk-pixbuf@2.31.1-2%2Bdeb8u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ytk-9srj-zfff
1
vulnerability VCID-2a49-ryer-vkhd
2
vulnerability VCID-37b2-h2nn-ufa8
3
vulnerability VCID-4jf2-xww4-mfau
4
vulnerability VCID-4zm2-zv71-jfat
5
vulnerability VCID-7cp9-37h3-tkhq
6
vulnerability VCID-7hwy-9gdx-rya8
7
vulnerability VCID-drq5-6jps-skax
8
vulnerability VCID-hfkx-cat3-puf8
9
vulnerability VCID-juwv-p63q-8ffy
10
vulnerability VCID-jzz2-x2gk-8kf1
11
vulnerability VCID-k2ph-py3f-aycu
12
vulnerability VCID-ku5p-8cre-xkee
13
vulnerability VCID-pf79-yf2z-syem
14
vulnerability VCID-q8wp-65d8-yqcr
15
vulnerability VCID-qwv5-ntpt-mbbp
16
vulnerability VCID-rzj1-83cd-4yer
17
vulnerability VCID-vcfh-3p9e-4uc3
18
vulnerability VCID-xg3j-c698-3kgu
19
vulnerability VCID-y1sm-7uec-1bc5
20
vulnerability VCID-zu3p-941y-nydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.31.1-2%252Bdeb8u7
2
url pkg:deb/debian/gdk-pixbuf@2.36.5-2%2Bdeb9u2
purl pkg:deb/debian/gdk-pixbuf@2.36.5-2%2Bdeb9u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ytk-9srj-zfff
1
vulnerability VCID-2a49-ryer-vkhd
2
vulnerability VCID-37b2-h2nn-ufa8
3
vulnerability VCID-4jf2-xww4-mfau
4
vulnerability VCID-4zm2-zv71-jfat
5
vulnerability VCID-7cp9-37h3-tkhq
6
vulnerability VCID-juwv-p63q-8ffy
7
vulnerability VCID-jzz2-x2gk-8kf1
8
vulnerability VCID-pf79-yf2z-syem
9
vulnerability VCID-q8wp-65d8-yqcr
10
vulnerability VCID-vcfh-3p9e-4uc3
11
vulnerability VCID-xg3j-c698-3kgu
12
vulnerability VCID-y1sm-7uec-1bc5
13
vulnerability VCID-zu3p-941y-nydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.36.5-2%252Bdeb9u2
aliases CVE-2015-7673
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k2ph-py3f-aycu
17
url VCID-ku5p-8cre-xkee
vulnerability_id VCID-ku5p-8cre-xkee
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8875.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8875.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8875
reference_id
reference_type
scores
0
value 0.00598
scoring_system epss
scoring_elements 0.69433
published_at 2026-04-16T12:55:00Z
1
value 0.00598
scoring_system epss
scoring_elements 0.69407
published_at 2026-04-12T12:55:00Z
2
value 0.00598
scoring_system epss
scoring_elements 0.69394
published_at 2026-04-13T12:55:00Z
3
value 0.00598
scoring_system epss
scoring_elements 0.69325
published_at 2026-04-01T12:55:00Z
4
value 0.00598
scoring_system epss
scoring_elements 0.69337
published_at 2026-04-02T12:55:00Z
5
value 0.00598
scoring_system epss
scoring_elements 0.69354
published_at 2026-04-04T12:55:00Z
6
value 0.00598
scoring_system epss
scoring_elements 0.69334
published_at 2026-04-07T12:55:00Z
7
value 0.00598
scoring_system epss
scoring_elements 0.69384
published_at 2026-04-08T12:55:00Z
8
value 0.00598
scoring_system epss
scoring_elements 0.694
published_at 2026-04-09T12:55:00Z
9
value 0.00598
scoring_system epss
scoring_elements 0.69423
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8875
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7552
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8875
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=dbfe8f70471864818bf458a39c8a99640895bd22
reference_id
reference_type
scores
url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=dbfe8f70471864818bf458a39c8a99640895bd22
6
reference_url http://www.debian.org/security/2016/dsa-3589
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3589
7
reference_url http://www.openwall.com/lists/oss-security/2016/05/12/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/05/12/3
8
reference_url http://www.openwall.com/lists/oss-security/2016/05/16/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/05/16/1
9
reference_url http://www.openwall.com/lists/oss-security/2016/05/17/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/05/17/7
10
reference_url http://www.ubuntu.com/usn/USN-3085-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3085-1
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1337063
reference_id 1337063
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1337063
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-8875
reference_id CVE-2015-8875
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-8875
15
reference_url https://usn.ubuntu.com/3085-1/
reference_id USN-3085-1
reference_type
scores
url https://usn.ubuntu.com/3085-1/
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@2.31.1-2%2Bdeb8u7
purl pkg:deb/debian/gdk-pixbuf@2.31.1-2%2Bdeb8u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ytk-9srj-zfff
1
vulnerability VCID-2a49-ryer-vkhd
2
vulnerability VCID-37b2-h2nn-ufa8
3
vulnerability VCID-4jf2-xww4-mfau
4
vulnerability VCID-4zm2-zv71-jfat
5
vulnerability VCID-7cp9-37h3-tkhq
6
vulnerability VCID-7hwy-9gdx-rya8
7
vulnerability VCID-drq5-6jps-skax
8
vulnerability VCID-hfkx-cat3-puf8
9
vulnerability VCID-juwv-p63q-8ffy
10
vulnerability VCID-jzz2-x2gk-8kf1
11
vulnerability VCID-k2ph-py3f-aycu
12
vulnerability VCID-ku5p-8cre-xkee
13
vulnerability VCID-pf79-yf2z-syem
14
vulnerability VCID-q8wp-65d8-yqcr
15
vulnerability VCID-qwv5-ntpt-mbbp
16
vulnerability VCID-rzj1-83cd-4yer
17
vulnerability VCID-vcfh-3p9e-4uc3
18
vulnerability VCID-xg3j-c698-3kgu
19
vulnerability VCID-y1sm-7uec-1bc5
20
vulnerability VCID-zu3p-941y-nydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.31.1-2%252Bdeb8u7
1
url pkg:deb/debian/gdk-pixbuf@2.36.5-2%2Bdeb9u2
purl pkg:deb/debian/gdk-pixbuf@2.36.5-2%2Bdeb9u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ytk-9srj-zfff
1
vulnerability VCID-2a49-ryer-vkhd
2
vulnerability VCID-37b2-h2nn-ufa8
3
vulnerability VCID-4jf2-xww4-mfau
4
vulnerability VCID-4zm2-zv71-jfat
5
vulnerability VCID-7cp9-37h3-tkhq
6
vulnerability VCID-juwv-p63q-8ffy
7
vulnerability VCID-jzz2-x2gk-8kf1
8
vulnerability VCID-pf79-yf2z-syem
9
vulnerability VCID-q8wp-65d8-yqcr
10
vulnerability VCID-vcfh-3p9e-4uc3
11
vulnerability VCID-xg3j-c698-3kgu
12
vulnerability VCID-y1sm-7uec-1bc5
13
vulnerability VCID-zu3p-941y-nydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.36.5-2%252Bdeb9u2
aliases CVE-2015-8875
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ku5p-8cre-xkee
18
url VCID-pf79-yf2z-syem
vulnerability_id VCID-pf79-yf2z-syem
summary
Out-of-bounds Write
In GNOME GdkPixbuf (aka gdk-pixbuf) through 2.42.10, the ANI (Windows animated cursor) decoder encounters heap memory corruption (in ani_load_chunk in io-ani.c) when parsing chunks in a crafted .ani file. A crafted file could allow an attacker to overwrite heap metadata, leading to a denial of service or code execution attack. This occurs in gdk_pixbuf_set_option() in gdk-pixbuf.c.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48622.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48622.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48622
reference_id
reference_type
scores
0
value 0.00077
scoring_system epss
scoring_elements 0.23131
published_at 2026-04-02T12:55:00Z
1
value 0.00077
scoring_system epss
scoring_elements 0.23031
published_at 2026-04-16T12:55:00Z
2
value 0.00077
scoring_system epss
scoring_elements 0.23111
published_at 2026-04-11T12:55:00Z
3
value 0.00077
scoring_system epss
scoring_elements 0.23075
published_at 2026-04-12T12:55:00Z
4
value 0.00077
scoring_system epss
scoring_elements 0.23018
published_at 2026-04-13T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.23175
published_at 2026-04-04T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.22965
published_at 2026-04-07T12:55:00Z
7
value 0.00077
scoring_system epss
scoring_elements 0.23039
published_at 2026-04-08T12:55:00Z
8
value 0.00077
scoring_system epss
scoring_elements 0.23092
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48622
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48622
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48622
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/202
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-26T19:23:51Z/
url https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/202
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071265
reference_id 1071265
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071265
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2260545
reference_id 2260545
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2260545
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-48622
reference_id CVE-2022-48622
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2022-48622
8
reference_url https://access.redhat.com/errata/RHSA-2024:3341
reference_id RHSA-2024:3341
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3341
9
reference_url https://access.redhat.com/errata/RHSA-2024:3834
reference_id RHSA-2024:3834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3834
10
reference_url https://usn.ubuntu.com/6806-1/
reference_id USN-6806-1
reference_type
scores
url https://usn.ubuntu.com/6806-1/
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2
purl pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-jzz2-x2gk-8kf1
1
vulnerability VCID-xg3j-c698-3kgu
2
vulnerability VCID-xg6z-9vh5-pbd6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2
aliases CVE-2022-48622
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pf79-yf2z-syem
19
url VCID-q8wp-65d8-yqcr
vulnerability_id VCID-q8wp-65d8-yqcr
summary
Multiple vulnerabilities have been found in GDK-PixBuf, the worst
    of which could result in the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6311.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6311.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-6311
reference_id
reference_type
scores
0
value 0.01913
scoring_system epss
scoring_elements 0.83233
published_at 2026-04-01T12:55:00Z
1
value 0.01913
scoring_system epss
scoring_elements 0.83249
published_at 2026-04-02T12:55:00Z
2
value 0.01913
scoring_system epss
scoring_elements 0.83264
published_at 2026-04-04T12:55:00Z
3
value 0.01913
scoring_system epss
scoring_elements 0.83263
published_at 2026-04-07T12:55:00Z
4
value 0.01913
scoring_system epss
scoring_elements 0.83287
published_at 2026-04-08T12:55:00Z
5
value 0.01913
scoring_system epss
scoring_elements 0.83296
published_at 2026-04-09T12:55:00Z
6
value 0.01913
scoring_system epss
scoring_elements 0.83312
published_at 2026-04-11T12:55:00Z
7
value 0.01913
scoring_system epss
scoring_elements 0.83306
published_at 2026-04-12T12:55:00Z
8
value 0.01913
scoring_system epss
scoring_elements 0.83301
published_at 2026-04-13T12:55:00Z
9
value 0.01913
scoring_system epss
scoring_elements 0.83337
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-6311
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6311
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1427222
reference_id 1427222
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1427222
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858491
reference_id 858491
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858491
6
reference_url https://security.gentoo.org/glsa/201709-08
reference_id GLSA-201709-08
reference_type
scores
url https://security.gentoo.org/glsa/201709-08
7
reference_url https://usn.ubuntu.com/3418-1/
reference_id USN-3418-1
reference_type
scores
url https://usn.ubuntu.com/3418-1/
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@2.38.1%2Bdfsg-1
purl pkg:deb/debian/gdk-pixbuf@2.38.1%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2a49-ryer-vkhd
1
vulnerability VCID-4zm2-zv71-jfat
2
vulnerability VCID-juwv-p63q-8ffy
3
vulnerability VCID-jzz2-x2gk-8kf1
4
vulnerability VCID-pf79-yf2z-syem
5
vulnerability VCID-vcfh-3p9e-4uc3
6
vulnerability VCID-xg3j-c698-3kgu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.38.1%252Bdfsg-1
aliases CVE-2017-6311
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q8wp-65d8-yqcr
20
url VCID-qwv5-ntpt-mbbp
vulnerability_id VCID-qwv5-ntpt-mbbp
summary
Multiple buffer overflow vulnerabilities in gdk-pixbuf may allow
    remote attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url http://ftp.gnome.org/pub/gnome/sources/gdk-pixbuf/2.32/gdk-pixbuf-2.32.1.news
reference_id
reference_type
scores
url http://ftp.gnome.org/pub/gnome/sources/gdk-pixbuf/2.32/gdk-pixbuf-2.32.1.news
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7674.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7674.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7674
reference_id
reference_type
scores
0
value 0.0155
scoring_system epss
scoring_elements 0.8145
published_at 2026-04-16T12:55:00Z
1
value 0.0155
scoring_system epss
scoring_elements 0.81348
published_at 2026-04-01T12:55:00Z
2
value 0.0155
scoring_system epss
scoring_elements 0.81358
published_at 2026-04-02T12:55:00Z
3
value 0.0155
scoring_system epss
scoring_elements 0.8138
published_at 2026-04-04T12:55:00Z
4
value 0.0155
scoring_system epss
scoring_elements 0.81378
published_at 2026-04-07T12:55:00Z
5
value 0.0155
scoring_system epss
scoring_elements 0.81406
published_at 2026-04-08T12:55:00Z
6
value 0.0155
scoring_system epss
scoring_elements 0.8141
published_at 2026-04-09T12:55:00Z
7
value 0.0155
scoring_system epss
scoring_elements 0.81432
published_at 2026-04-11T12:55:00Z
8
value 0.0155
scoring_system epss
scoring_elements 0.8142
published_at 2026-04-12T12:55:00Z
9
value 0.0155
scoring_system epss
scoring_elements 0.81413
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7674
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674
7
reference_url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=e9a5704edaa9aee9498f1fbf6e1b70fcce2e55aa
reference_id
reference_type
scores
url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=e9a5704edaa9aee9498f1fbf6e1b70fcce2e55aa
8
reference_url http://www.debian.org/security/2015/dsa-3378
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3378
9
reference_url http://www.openwall.com/lists/oss-security/2015/10/01/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/10/01/4
10
reference_url http://www.openwall.com/lists/oss-security/2015/10/01/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/10/01/7
11
reference_url http://www.openwall.com/lists/oss-security/2015/10/02/10
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/10/02/10
12
reference_url http://www.openwall.com/lists/oss-security/2015/10/05/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/10/05/7
13
reference_url http://www.securityfocus.com/bid/76955
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/76955
14
reference_url http://www.ubuntu.com/usn/USN-2767-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2767-1
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1268249
reference_id 1268249
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1268249
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7674
reference_id CVE-2015-7674
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7674
22
reference_url https://security.gentoo.org/glsa/201512-05
reference_id GLSA-201512-05
reference_type
scores
url https://security.gentoo.org/glsa/201512-05
23
reference_url https://usn.ubuntu.com/2767-1/
reference_id USN-2767-1
reference_type
scores
url https://usn.ubuntu.com/2767-1/
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@2.26.1-1%2Bdeb7u3
purl pkg:deb/debian/gdk-pixbuf@2.26.1-1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ytk-9srj-zfff
1
vulnerability VCID-2a49-ryer-vkhd
2
vulnerability VCID-37b2-h2nn-ufa8
3
vulnerability VCID-4jf2-xww4-mfau
4
vulnerability VCID-4zm2-zv71-jfat
5
vulnerability VCID-7cp9-37h3-tkhq
6
vulnerability VCID-7hwy-9gdx-rya8
7
vulnerability VCID-drq5-6jps-skax
8
vulnerability VCID-hfkx-cat3-puf8
9
vulnerability VCID-juwv-p63q-8ffy
10
vulnerability VCID-jzz2-x2gk-8kf1
11
vulnerability VCID-k2ph-py3f-aycu
12
vulnerability VCID-ku5p-8cre-xkee
13
vulnerability VCID-pf79-yf2z-syem
14
vulnerability VCID-q8wp-65d8-yqcr
15
vulnerability VCID-qwv5-ntpt-mbbp
16
vulnerability VCID-rzj1-83cd-4yer
17
vulnerability VCID-vcfh-3p9e-4uc3
18
vulnerability VCID-xg3j-c698-3kgu
19
vulnerability VCID-y1sm-7uec-1bc5
20
vulnerability VCID-zu3p-941y-nydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.26.1-1%252Bdeb7u3
1
url pkg:deb/debian/gdk-pixbuf@2.31.1-2%2Bdeb8u7
purl pkg:deb/debian/gdk-pixbuf@2.31.1-2%2Bdeb8u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ytk-9srj-zfff
1
vulnerability VCID-2a49-ryer-vkhd
2
vulnerability VCID-37b2-h2nn-ufa8
3
vulnerability VCID-4jf2-xww4-mfau
4
vulnerability VCID-4zm2-zv71-jfat
5
vulnerability VCID-7cp9-37h3-tkhq
6
vulnerability VCID-7hwy-9gdx-rya8
7
vulnerability VCID-drq5-6jps-skax
8
vulnerability VCID-hfkx-cat3-puf8
9
vulnerability VCID-juwv-p63q-8ffy
10
vulnerability VCID-jzz2-x2gk-8kf1
11
vulnerability VCID-k2ph-py3f-aycu
12
vulnerability VCID-ku5p-8cre-xkee
13
vulnerability VCID-pf79-yf2z-syem
14
vulnerability VCID-q8wp-65d8-yqcr
15
vulnerability VCID-qwv5-ntpt-mbbp
16
vulnerability VCID-rzj1-83cd-4yer
17
vulnerability VCID-vcfh-3p9e-4uc3
18
vulnerability VCID-xg3j-c698-3kgu
19
vulnerability VCID-y1sm-7uec-1bc5
20
vulnerability VCID-zu3p-941y-nydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.31.1-2%252Bdeb8u7
2
url pkg:deb/debian/gdk-pixbuf@2.36.5-2%2Bdeb9u2
purl pkg:deb/debian/gdk-pixbuf@2.36.5-2%2Bdeb9u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ytk-9srj-zfff
1
vulnerability VCID-2a49-ryer-vkhd
2
vulnerability VCID-37b2-h2nn-ufa8
3
vulnerability VCID-4jf2-xww4-mfau
4
vulnerability VCID-4zm2-zv71-jfat
5
vulnerability VCID-7cp9-37h3-tkhq
6
vulnerability VCID-juwv-p63q-8ffy
7
vulnerability VCID-jzz2-x2gk-8kf1
8
vulnerability VCID-pf79-yf2z-syem
9
vulnerability VCID-q8wp-65d8-yqcr
10
vulnerability VCID-vcfh-3p9e-4uc3
11
vulnerability VCID-xg3j-c698-3kgu
12
vulnerability VCID-y1sm-7uec-1bc5
13
vulnerability VCID-zu3p-941y-nydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.36.5-2%252Bdeb9u2
aliases CVE-2015-7674
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qwv5-ntpt-mbbp
21
url VCID-rzj1-83cd-4yer
vulnerability_id VCID-rzj1-83cd-4yer
summary security update
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7552.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7552.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7552
reference_id
reference_type
scores
0
value 0.01699
scoring_system epss
scoring_elements 0.82214
published_at 2026-04-01T12:55:00Z
1
value 0.01699
scoring_system epss
scoring_elements 0.82319
published_at 2026-04-16T12:55:00Z
2
value 0.01699
scoring_system epss
scoring_elements 0.82296
published_at 2026-04-11T12:55:00Z
3
value 0.01699
scoring_system epss
scoring_elements 0.8229
published_at 2026-04-12T12:55:00Z
4
value 0.01699
scoring_system epss
scoring_elements 0.82284
published_at 2026-04-13T12:55:00Z
5
value 0.01699
scoring_system epss
scoring_elements 0.82227
published_at 2026-04-02T12:55:00Z
6
value 0.01699
scoring_system epss
scoring_elements 0.82247
published_at 2026-04-04T12:55:00Z
7
value 0.01699
scoring_system epss
scoring_elements 0.82242
published_at 2026-04-07T12:55:00Z
8
value 0.01699
scoring_system epss
scoring_elements 0.82269
published_at 2026-04-08T12:55:00Z
9
value 0.01699
scoring_system epss
scoring_elements 0.82276
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7552
4
reference_url https://bugzilla.suse.com/show_bug.cgi?id=958963
reference_id
reference_type
scores
url https://bugzilla.suse.com/show_bug.cgi?id=958963
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7552
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7552
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8875
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:S/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SJF5ARFOX4BFUK6YCBKGAKBQYECO3AI2/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SJF5ARFOX4BFUK6YCBKGAKBQYECO3AI2/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSAZ6UCKKXC5VOWXGWQHOX2ZBLLATIOT/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSAZ6UCKKXC5VOWXGWQHOX2ZBLLATIOT/
10
reference_url http://www.debian.org/security/2016/dsa-3589
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3589
11
reference_url http://www.ubuntu.com/usn/USN-3085-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-3085-1
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1378894
reference_id 1378894
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1378894
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7552
reference_id CVE-2015-7552
reference_type
scores
0
value 9.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:C/I:C/A:C
1
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2015-7552
15
reference_url https://usn.ubuntu.com/3085-1/
reference_id USN-3085-1
reference_type
scores
url https://usn.ubuntu.com/3085-1/
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@2.31.1-2%2Bdeb8u7
purl pkg:deb/debian/gdk-pixbuf@2.31.1-2%2Bdeb8u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ytk-9srj-zfff
1
vulnerability VCID-2a49-ryer-vkhd
2
vulnerability VCID-37b2-h2nn-ufa8
3
vulnerability VCID-4jf2-xww4-mfau
4
vulnerability VCID-4zm2-zv71-jfat
5
vulnerability VCID-7cp9-37h3-tkhq
6
vulnerability VCID-7hwy-9gdx-rya8
7
vulnerability VCID-drq5-6jps-skax
8
vulnerability VCID-hfkx-cat3-puf8
9
vulnerability VCID-juwv-p63q-8ffy
10
vulnerability VCID-jzz2-x2gk-8kf1
11
vulnerability VCID-k2ph-py3f-aycu
12
vulnerability VCID-ku5p-8cre-xkee
13
vulnerability VCID-pf79-yf2z-syem
14
vulnerability VCID-q8wp-65d8-yqcr
15
vulnerability VCID-qwv5-ntpt-mbbp
16
vulnerability VCID-rzj1-83cd-4yer
17
vulnerability VCID-vcfh-3p9e-4uc3
18
vulnerability VCID-xg3j-c698-3kgu
19
vulnerability VCID-y1sm-7uec-1bc5
20
vulnerability VCID-zu3p-941y-nydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.31.1-2%252Bdeb8u7
1
url pkg:deb/debian/gdk-pixbuf@2.36.5-2%2Bdeb9u2
purl pkg:deb/debian/gdk-pixbuf@2.36.5-2%2Bdeb9u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ytk-9srj-zfff
1
vulnerability VCID-2a49-ryer-vkhd
2
vulnerability VCID-37b2-h2nn-ufa8
3
vulnerability VCID-4jf2-xww4-mfau
4
vulnerability VCID-4zm2-zv71-jfat
5
vulnerability VCID-7cp9-37h3-tkhq
6
vulnerability VCID-juwv-p63q-8ffy
7
vulnerability VCID-jzz2-x2gk-8kf1
8
vulnerability VCID-pf79-yf2z-syem
9
vulnerability VCID-q8wp-65d8-yqcr
10
vulnerability VCID-vcfh-3p9e-4uc3
11
vulnerability VCID-xg3j-c698-3kgu
12
vulnerability VCID-y1sm-7uec-1bc5
13
vulnerability VCID-zu3p-941y-nydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.36.5-2%252Bdeb9u2
aliases CVE-2015-7552
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rzj1-83cd-4yer
22
url VCID-syr2-zvtz-f3au
vulnerability_id VCID-syr2-zvtz-f3au
summary
Multiple vulnerabilities in gdk-pixbuf may create a Denial of
    Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2370.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2370.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2370
reference_id
reference_type
scores
0
value 0.02266
scoring_system epss
scoring_elements 0.84555
published_at 2026-04-01T12:55:00Z
1
value 0.02266
scoring_system epss
scoring_elements 0.84571
published_at 2026-04-02T12:55:00Z
2
value 0.02266
scoring_system epss
scoring_elements 0.84592
published_at 2026-04-04T12:55:00Z
3
value 0.02266
scoring_system epss
scoring_elements 0.84595
published_at 2026-04-07T12:55:00Z
4
value 0.02266
scoring_system epss
scoring_elements 0.84617
published_at 2026-04-08T12:55:00Z
5
value 0.02266
scoring_system epss
scoring_elements 0.84624
published_at 2026-04-09T12:55:00Z
6
value 0.02266
scoring_system epss
scoring_elements 0.84643
published_at 2026-04-11T12:55:00Z
7
value 0.02266
scoring_system epss
scoring_elements 0.84638
published_at 2026-04-12T12:55:00Z
8
value 0.02266
scoring_system epss
scoring_elements 0.84633
published_at 2026-04-13T12:55:00Z
9
value 0.02266
scoring_system epss
scoring_elements 0.84654
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2370
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2370
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=822468
reference_id 822468
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=822468
4
reference_url https://security.gentoo.org/glsa/201206-20
reference_id GLSA-201206-20
reference_type
scores
url https://security.gentoo.org/glsa/201206-20
5
reference_url https://access.redhat.com/errata/RHSA-2013:0135
reference_id RHSA-2013:0135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0135
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@2.26.1-1%2Bdeb7u3
purl pkg:deb/debian/gdk-pixbuf@2.26.1-1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ytk-9srj-zfff
1
vulnerability VCID-2a49-ryer-vkhd
2
vulnerability VCID-37b2-h2nn-ufa8
3
vulnerability VCID-4jf2-xww4-mfau
4
vulnerability VCID-4zm2-zv71-jfat
5
vulnerability VCID-7cp9-37h3-tkhq
6
vulnerability VCID-7hwy-9gdx-rya8
7
vulnerability VCID-drq5-6jps-skax
8
vulnerability VCID-hfkx-cat3-puf8
9
vulnerability VCID-juwv-p63q-8ffy
10
vulnerability VCID-jzz2-x2gk-8kf1
11
vulnerability VCID-k2ph-py3f-aycu
12
vulnerability VCID-ku5p-8cre-xkee
13
vulnerability VCID-pf79-yf2z-syem
14
vulnerability VCID-q8wp-65d8-yqcr
15
vulnerability VCID-qwv5-ntpt-mbbp
16
vulnerability VCID-rzj1-83cd-4yer
17
vulnerability VCID-vcfh-3p9e-4uc3
18
vulnerability VCID-xg3j-c698-3kgu
19
vulnerability VCID-y1sm-7uec-1bc5
20
vulnerability VCID-zu3p-941y-nydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.26.1-1%252Bdeb7u3
aliases CVE-2012-2370
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-syr2-zvtz-f3au
23
url VCID-v9xs-ur2x-jygb
vulnerability_id VCID-v9xs-ur2x-jygb
summary
Multiple vulnerabilities were found in Pidgin, the worst of which
    allowing for the remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2485.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2485.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2011-2485
reference_id
reference_type
scores
0
value 0.00677
scoring_system epss
scoring_elements 0.71463
published_at 2026-04-01T12:55:00Z
1
value 0.00677
scoring_system epss
scoring_elements 0.7147
published_at 2026-04-02T12:55:00Z
2
value 0.00677
scoring_system epss
scoring_elements 0.71487
published_at 2026-04-04T12:55:00Z
3
value 0.00677
scoring_system epss
scoring_elements 0.7146
published_at 2026-04-07T12:55:00Z
4
value 0.00677
scoring_system epss
scoring_elements 0.715
published_at 2026-04-08T12:55:00Z
5
value 0.00677
scoring_system epss
scoring_elements 0.71512
published_at 2026-04-09T12:55:00Z
6
value 0.00677
scoring_system epss
scoring_elements 0.71535
published_at 2026-04-11T12:55:00Z
7
value 0.00677
scoring_system epss
scoring_elements 0.71519
published_at 2026-04-12T12:55:00Z
8
value 0.00677
scoring_system epss
scoring_elements 0.71501
published_at 2026-04-13T12:55:00Z
9
value 0.00677
scoring_system epss
scoring_elements 0.71547
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2011-2485
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2485
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=631524
reference_id 631524
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=631524
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=715337
reference_id 715337
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=715337
5
reference_url https://security.gentoo.org/glsa/201206-11
reference_id GLSA-201206-11
reference_type
scores
url https://security.gentoo.org/glsa/201206-11
6
reference_url https://security.gentoo.org/glsa/201206-20
reference_id GLSA-201206-20
reference_type
scores
url https://security.gentoo.org/glsa/201206-20
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@2.26.1-1%2Bdeb7u3
purl pkg:deb/debian/gdk-pixbuf@2.26.1-1%2Bdeb7u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ytk-9srj-zfff
1
vulnerability VCID-2a49-ryer-vkhd
2
vulnerability VCID-37b2-h2nn-ufa8
3
vulnerability VCID-4jf2-xww4-mfau
4
vulnerability VCID-4zm2-zv71-jfat
5
vulnerability VCID-7cp9-37h3-tkhq
6
vulnerability VCID-7hwy-9gdx-rya8
7
vulnerability VCID-drq5-6jps-skax
8
vulnerability VCID-hfkx-cat3-puf8
9
vulnerability VCID-juwv-p63q-8ffy
10
vulnerability VCID-jzz2-x2gk-8kf1
11
vulnerability VCID-k2ph-py3f-aycu
12
vulnerability VCID-ku5p-8cre-xkee
13
vulnerability VCID-pf79-yf2z-syem
14
vulnerability VCID-q8wp-65d8-yqcr
15
vulnerability VCID-qwv5-ntpt-mbbp
16
vulnerability VCID-rzj1-83cd-4yer
17
vulnerability VCID-vcfh-3p9e-4uc3
18
vulnerability VCID-xg3j-c698-3kgu
19
vulnerability VCID-y1sm-7uec-1bc5
20
vulnerability VCID-zu3p-941y-nydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.26.1-1%252Bdeb7u3
aliases CVE-2011-2485
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v9xs-ur2x-jygb
24
url VCID-vcfh-3p9e-4uc3
vulnerability_id VCID-vcfh-3p9e-4uc3
summary gdk-pixbuf: integer wraparound in the GIF loader of gdk-pixbuf via crafted input leads to segmentation fault
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20240.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20240.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20240
reference_id
reference_type
scores
0
value 0.00794
scoring_system epss
scoring_elements 0.73884
published_at 2026-04-01T12:55:00Z
1
value 0.00794
scoring_system epss
scoring_elements 0.73894
published_at 2026-04-02T12:55:00Z
2
value 0.00794
scoring_system epss
scoring_elements 0.73918
published_at 2026-04-04T12:55:00Z
3
value 0.00794
scoring_system epss
scoring_elements 0.73889
published_at 2026-04-07T12:55:00Z
4
value 0.00794
scoring_system epss
scoring_elements 0.73924
published_at 2026-04-08T12:55:00Z
5
value 0.00794
scoring_system epss
scoring_elements 0.73937
published_at 2026-04-09T12:55:00Z
6
value 0.00794
scoring_system epss
scoring_elements 0.73959
published_at 2026-04-11T12:55:00Z
7
value 0.00794
scoring_system epss
scoring_elements 0.73941
published_at 2026-04-12T12:55:00Z
8
value 0.00794
scoring_system epss
scoring_elements 0.73933
published_at 2026-04-13T12:55:00Z
9
value 0.00794
scoring_system epss
scoring_elements 0.73974
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20240
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20240
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1926787
reference_id 1926787
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1926787
5
reference_url https://usn.ubuntu.com/4743-1/
reference_id USN-4743-1
reference_type
scores
url https://usn.ubuntu.com/4743-1/
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2
purl pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-jzz2-x2gk-8kf1
1
vulnerability VCID-xg3j-c698-3kgu
2
vulnerability VCID-xg6z-9vh5-pbd6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2
aliases CVE-2021-20240
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vcfh-3p9e-4uc3
25
url VCID-wrze-mrwx-nfdv
vulnerability_id VCID-wrze-mrwx-nfdv
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0111.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0111.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0111
reference_id
reference_type
scores
0
value 0.01347
scoring_system epss
scoring_elements 0.8003
published_at 2026-04-01T12:55:00Z
1
value 0.01347
scoring_system epss
scoring_elements 0.80037
published_at 2026-04-02T12:55:00Z
2
value 0.01347
scoring_system epss
scoring_elements 0.80058
published_at 2026-04-04T12:55:00Z
3
value 0.01347
scoring_system epss
scoring_elements 0.80048
published_at 2026-04-07T12:55:00Z
4
value 0.01347
scoring_system epss
scoring_elements 0.80076
published_at 2026-04-08T12:55:00Z
5
value 0.01347
scoring_system epss
scoring_elements 0.80084
published_at 2026-04-09T12:55:00Z
6
value 0.01347
scoring_system epss
scoring_elements 0.80104
published_at 2026-04-11T12:55:00Z
7
value 0.01347
scoring_system epss
scoring_elements 0.80088
published_at 2026-04-12T12:55:00Z
8
value 0.01347
scoring_system epss
scoring_elements 0.80079
published_at 2026-04-13T12:55:00Z
9
value 0.01347
scoring_system epss
scoring_elements 0.80108
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0111
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0111
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617155
reference_id 1617155
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617155
4
reference_url https://access.redhat.com/errata/RHSA-2004:102
reference_id RHSA-2004:102
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:102
5
reference_url https://access.redhat.com/errata/RHSA-2004:103
reference_id RHSA-2004:103
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:103
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@0.22.0-8.1
purl pkg:deb/debian/gdk-pixbuf@0.22.0-8.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1jyr-kac3-2ua2
1
vulnerability VCID-1ytk-9srj-zfff
2
vulnerability VCID-2a49-ryer-vkhd
3
vulnerability VCID-37b2-h2nn-ufa8
4
vulnerability VCID-3vjs-geuw-j7h7
5
vulnerability VCID-4jf2-xww4-mfau
6
vulnerability VCID-4zm2-zv71-jfat
7
vulnerability VCID-7cp9-37h3-tkhq
8
vulnerability VCID-7hwy-9gdx-rya8
9
vulnerability VCID-drq5-6jps-skax
10
vulnerability VCID-ecuv-xp49-5yeh
11
vulnerability VCID-hfkx-cat3-puf8
12
vulnerability VCID-juwv-p63q-8ffy
13
vulnerability VCID-jzz2-x2gk-8kf1
14
vulnerability VCID-k2ph-py3f-aycu
15
vulnerability VCID-ku5p-8cre-xkee
16
vulnerability VCID-pf79-yf2z-syem
17
vulnerability VCID-q8wp-65d8-yqcr
18
vulnerability VCID-qwv5-ntpt-mbbp
19
vulnerability VCID-rzj1-83cd-4yer
20
vulnerability VCID-syr2-zvtz-f3au
21
vulnerability VCID-v9xs-ur2x-jygb
22
vulnerability VCID-vcfh-3p9e-4uc3
23
vulnerability VCID-xg3j-c698-3kgu
24
vulnerability VCID-y1sm-7uec-1bc5
25
vulnerability VCID-zu3p-941y-nydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@0.22.0-8.1
aliases CVE-2004-0111
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wrze-mrwx-nfdv
26
url VCID-xg3j-c698-3kgu
vulnerability_id VCID-xg3j-c698-3kgu
summary gdk-pixbuf: Uninitialized Memory Disclosure in GdkPixbuf GIF LZW Decoder
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6199.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6199.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-6199
reference_id
reference_type
scores
0
value 0.00024
scoring_system epss
scoring_elements 0.06599
published_at 2026-04-04T12:55:00Z
1
value 0.00024
scoring_system epss
scoring_elements 0.0655
published_at 2026-04-02T12:55:00Z
2
value 0.00024
scoring_system epss
scoring_elements 0.06582
published_at 2026-04-07T12:55:00Z
3
value 0.00024
scoring_system epss
scoring_elements 0.06633
published_at 2026-04-08T12:55:00Z
4
value 0.00024
scoring_system epss
scoring_elements 0.06675
published_at 2026-04-09T12:55:00Z
5
value 0.00024
scoring_system epss
scoring_elements 0.06676
published_at 2026-04-11T12:55:00Z
6
value 0.00024
scoring_system epss
scoring_elements 0.06669
published_at 2026-04-12T12:55:00Z
7
value 0.00084
scoring_system epss
scoring_elements 0.24378
published_at 2026-04-16T12:55:00Z
8
value 0.00084
scoring_system epss
scoring_elements 0.24361
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-6199
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6199
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6199
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107994
reference_id 1107994
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107994
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2373147
reference_id 2373147
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:43:00Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2373147
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2025-6199
reference_id CVE-2025-6199
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:43:00Z/
url https://access.redhat.com/security/cve/CVE-2025-6199
12
reference_url https://usn.ubuntu.com/7662-1/
reference_id USN-7662-1
reference_type
scores
url https://usn.ubuntu.com/7662-1/
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3
purl pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-xg6z-9vh5-pbd6
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3
aliases CVE-2025-6199
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xg3j-c698-3kgu
27
url VCID-y1dx-tg6t-aqe4
vulnerability_id VCID-y1dx-tg6t-aqe4
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0788.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0788.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0788
reference_id
reference_type
scores
0
value 0.1293
scoring_system epss
scoring_elements 0.94022
published_at 2026-04-01T12:55:00Z
1
value 0.1293
scoring_system epss
scoring_elements 0.94032
published_at 2026-04-02T12:55:00Z
2
value 0.1293
scoring_system epss
scoring_elements 0.94043
published_at 2026-04-04T12:55:00Z
3
value 0.1293
scoring_system epss
scoring_elements 0.94046
published_at 2026-04-07T12:55:00Z
4
value 0.1293
scoring_system epss
scoring_elements 0.94054
published_at 2026-04-08T12:55:00Z
5
value 0.1293
scoring_system epss
scoring_elements 0.94058
published_at 2026-04-09T12:55:00Z
6
value 0.1293
scoring_system epss
scoring_elements 0.94063
published_at 2026-04-13T12:55:00Z
7
value 0.1293
scoring_system epss
scoring_elements 0.94079
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0788
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0788
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617290
reference_id 1617290
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617290
4
reference_url https://access.redhat.com/errata/RHSA-2004:447
reference_id RHSA-2004:447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:447
5
reference_url https://access.redhat.com/errata/RHSA-2004:466
reference_id RHSA-2004:466
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:466
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@0.22.0-8.1
purl pkg:deb/debian/gdk-pixbuf@0.22.0-8.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1jyr-kac3-2ua2
1
vulnerability VCID-1ytk-9srj-zfff
2
vulnerability VCID-2a49-ryer-vkhd
3
vulnerability VCID-37b2-h2nn-ufa8
4
vulnerability VCID-3vjs-geuw-j7h7
5
vulnerability VCID-4jf2-xww4-mfau
6
vulnerability VCID-4zm2-zv71-jfat
7
vulnerability VCID-7cp9-37h3-tkhq
8
vulnerability VCID-7hwy-9gdx-rya8
9
vulnerability VCID-drq5-6jps-skax
10
vulnerability VCID-ecuv-xp49-5yeh
11
vulnerability VCID-hfkx-cat3-puf8
12
vulnerability VCID-juwv-p63q-8ffy
13
vulnerability VCID-jzz2-x2gk-8kf1
14
vulnerability VCID-k2ph-py3f-aycu
15
vulnerability VCID-ku5p-8cre-xkee
16
vulnerability VCID-pf79-yf2z-syem
17
vulnerability VCID-q8wp-65d8-yqcr
18
vulnerability VCID-qwv5-ntpt-mbbp
19
vulnerability VCID-rzj1-83cd-4yer
20
vulnerability VCID-syr2-zvtz-f3au
21
vulnerability VCID-v9xs-ur2x-jygb
22
vulnerability VCID-vcfh-3p9e-4uc3
23
vulnerability VCID-xg3j-c698-3kgu
24
vulnerability VCID-y1sm-7uec-1bc5
25
vulnerability VCID-zu3p-941y-nydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@0.22.0-8.1
aliases CVE-2004-0788
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y1dx-tg6t-aqe4
28
url VCID-y1sm-7uec-1bc5
vulnerability_id VCID-y1sm-7uec-1bc5
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2862.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2862.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-2862
reference_id
reference_type
scores
0
value 0.05689
scoring_system epss
scoring_elements 0.90362
published_at 2026-04-01T12:55:00Z
1
value 0.05689
scoring_system epss
scoring_elements 0.90418
published_at 2026-04-16T12:55:00Z
2
value 0.05689
scoring_system epss
scoring_elements 0.90408
published_at 2026-04-12T12:55:00Z
3
value 0.05689
scoring_system epss
scoring_elements 0.90402
published_at 2026-04-13T12:55:00Z
4
value 0.05689
scoring_system epss
scoring_elements 0.90364
published_at 2026-04-02T12:55:00Z
5
value 0.05689
scoring_system epss
scoring_elements 0.90376
published_at 2026-04-04T12:55:00Z
6
value 0.05689
scoring_system epss
scoring_elements 0.90381
published_at 2026-04-07T12:55:00Z
7
value 0.05689
scoring_system epss
scoring_elements 0.90394
published_at 2026-04-08T12:55:00Z
8
value 0.05689
scoring_system epss
scoring_elements 0.90401
published_at 2026-04-09T12:55:00Z
9
value 0.05689
scoring_system epss
scoring_elements 0.90409
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-2862
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2862
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1488817
reference_id 1488817
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1488817
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874552
reference_id 874552
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874552
6
reference_url https://access.redhat.com/errata/RHSA-2018:3140
reference_id RHSA-2018:3140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3140
7
reference_url https://usn.ubuntu.com/3418-1/
reference_id USN-3418-1
reference_type
scores
url https://usn.ubuntu.com/3418-1/
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@2.31.1-2%2Bdeb8u7
purl pkg:deb/debian/gdk-pixbuf@2.31.1-2%2Bdeb8u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ytk-9srj-zfff
1
vulnerability VCID-2a49-ryer-vkhd
2
vulnerability VCID-37b2-h2nn-ufa8
3
vulnerability VCID-4jf2-xww4-mfau
4
vulnerability VCID-4zm2-zv71-jfat
5
vulnerability VCID-7cp9-37h3-tkhq
6
vulnerability VCID-7hwy-9gdx-rya8
7
vulnerability VCID-drq5-6jps-skax
8
vulnerability VCID-hfkx-cat3-puf8
9
vulnerability VCID-juwv-p63q-8ffy
10
vulnerability VCID-jzz2-x2gk-8kf1
11
vulnerability VCID-k2ph-py3f-aycu
12
vulnerability VCID-ku5p-8cre-xkee
13
vulnerability VCID-pf79-yf2z-syem
14
vulnerability VCID-q8wp-65d8-yqcr
15
vulnerability VCID-qwv5-ntpt-mbbp
16
vulnerability VCID-rzj1-83cd-4yer
17
vulnerability VCID-vcfh-3p9e-4uc3
18
vulnerability VCID-xg3j-c698-3kgu
19
vulnerability VCID-y1sm-7uec-1bc5
20
vulnerability VCID-zu3p-941y-nydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.31.1-2%252Bdeb8u7
1
url pkg:deb/debian/gdk-pixbuf@2.36.5-2%2Bdeb9u2
purl pkg:deb/debian/gdk-pixbuf@2.36.5-2%2Bdeb9u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ytk-9srj-zfff
1
vulnerability VCID-2a49-ryer-vkhd
2
vulnerability VCID-37b2-h2nn-ufa8
3
vulnerability VCID-4jf2-xww4-mfau
4
vulnerability VCID-4zm2-zv71-jfat
5
vulnerability VCID-7cp9-37h3-tkhq
6
vulnerability VCID-juwv-p63q-8ffy
7
vulnerability VCID-jzz2-x2gk-8kf1
8
vulnerability VCID-pf79-yf2z-syem
9
vulnerability VCID-q8wp-65d8-yqcr
10
vulnerability VCID-vcfh-3p9e-4uc3
11
vulnerability VCID-xg3j-c698-3kgu
12
vulnerability VCID-y1sm-7uec-1bc5
13
vulnerability VCID-zu3p-941y-nydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.36.5-2%252Bdeb9u2
2
url pkg:deb/debian/gdk-pixbuf@2.38.1%2Bdfsg-1
purl pkg:deb/debian/gdk-pixbuf@2.38.1%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2a49-ryer-vkhd
1
vulnerability VCID-4zm2-zv71-jfat
2
vulnerability VCID-juwv-p63q-8ffy
3
vulnerability VCID-jzz2-x2gk-8kf1
4
vulnerability VCID-pf79-yf2z-syem
5
vulnerability VCID-vcfh-3p9e-4uc3
6
vulnerability VCID-xg3j-c698-3kgu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.38.1%252Bdfsg-1
aliases CVE-2017-2862
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y1sm-7uec-1bc5
29
url VCID-ysbh-ym55-nkbh
vulnerability_id VCID-ysbh-ym55-nkbh
summary security flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0753.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0753.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0753
reference_id
reference_type
scores
0
value 0.1204
scoring_system epss
scoring_elements 0.93744
published_at 2026-04-01T12:55:00Z
1
value 0.1204
scoring_system epss
scoring_elements 0.93753
published_at 2026-04-02T12:55:00Z
2
value 0.1204
scoring_system epss
scoring_elements 0.93764
published_at 2026-04-04T12:55:00Z
3
value 0.1204
scoring_system epss
scoring_elements 0.93767
published_at 2026-04-07T12:55:00Z
4
value 0.1204
scoring_system epss
scoring_elements 0.93776
published_at 2026-04-08T12:55:00Z
5
value 0.1204
scoring_system epss
scoring_elements 0.93778
published_at 2026-04-09T12:55:00Z
6
value 0.1204
scoring_system epss
scoring_elements 0.93783
published_at 2026-04-12T12:55:00Z
7
value 0.1204
scoring_system epss
scoring_elements 0.93784
published_at 2026-04-13T12:55:00Z
8
value 0.1204
scoring_system epss
scoring_elements 0.93806
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0753
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0753
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1617266
reference_id 1617266
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1617266
4
reference_url https://access.redhat.com/errata/RHSA-2004:447
reference_id RHSA-2004:447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:447
5
reference_url https://access.redhat.com/errata/RHSA-2004:466
reference_id RHSA-2004:466
reference_type
scores
url https://access.redhat.com/errata/RHSA-2004:466
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@0.22.0-8.1
purl pkg:deb/debian/gdk-pixbuf@0.22.0-8.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1jyr-kac3-2ua2
1
vulnerability VCID-1ytk-9srj-zfff
2
vulnerability VCID-2a49-ryer-vkhd
3
vulnerability VCID-37b2-h2nn-ufa8
4
vulnerability VCID-3vjs-geuw-j7h7
5
vulnerability VCID-4jf2-xww4-mfau
6
vulnerability VCID-4zm2-zv71-jfat
7
vulnerability VCID-7cp9-37h3-tkhq
8
vulnerability VCID-7hwy-9gdx-rya8
9
vulnerability VCID-drq5-6jps-skax
10
vulnerability VCID-ecuv-xp49-5yeh
11
vulnerability VCID-hfkx-cat3-puf8
12
vulnerability VCID-juwv-p63q-8ffy
13
vulnerability VCID-jzz2-x2gk-8kf1
14
vulnerability VCID-k2ph-py3f-aycu
15
vulnerability VCID-ku5p-8cre-xkee
16
vulnerability VCID-pf79-yf2z-syem
17
vulnerability VCID-q8wp-65d8-yqcr
18
vulnerability VCID-qwv5-ntpt-mbbp
19
vulnerability VCID-rzj1-83cd-4yer
20
vulnerability VCID-syr2-zvtz-f3au
21
vulnerability VCID-v9xs-ur2x-jygb
22
vulnerability VCID-vcfh-3p9e-4uc3
23
vulnerability VCID-xg3j-c698-3kgu
24
vulnerability VCID-y1sm-7uec-1bc5
25
vulnerability VCID-zu3p-941y-nydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@0.22.0-8.1
aliases CVE-2004-0753
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ysbh-ym55-nkbh
30
url VCID-zu3p-941y-nydy
vulnerability_id VCID-zu3p-941y-nydy
summary
A vulnerability has been found in GDK-PixBuf that may allow a
    remote attacker to execute arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000422.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000422.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-1000422
reference_id
reference_type
scores
0
value 0.00961
scoring_system epss
scoring_elements 0.76427
published_at 2026-04-01T12:55:00Z
1
value 0.00961
scoring_system epss
scoring_elements 0.76528
published_at 2026-04-16T12:55:00Z
2
value 0.00961
scoring_system epss
scoring_elements 0.76488
published_at 2026-04-13T12:55:00Z
3
value 0.00961
scoring_system epss
scoring_elements 0.76514
published_at 2026-04-11T12:55:00Z
4
value 0.00961
scoring_system epss
scoring_elements 0.76493
published_at 2026-04-12T12:55:00Z
5
value 0.00961
scoring_system epss
scoring_elements 0.76431
published_at 2026-04-02T12:55:00Z
6
value 0.00961
scoring_system epss
scoring_elements 0.7646
published_at 2026-04-04T12:55:00Z
7
value 0.00961
scoring_system epss
scoring_elements 0.76442
published_at 2026-04-07T12:55:00Z
8
value 0.00961
scoring_system epss
scoring_elements 0.76474
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-1000422
2
reference_url https://bugzilla.gnome.org/show_bug.cgi?id=785973
reference_id
reference_type
scores
url https://bugzilla.gnome.org/show_bug.cgi?id=785973
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000422
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000422
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://lists.debian.org/debian-lts-announce/2018/01/msg00007.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/01/msg00007.html
6
reference_url https://www.debian.org/security/2018/dsa-4088
reference_id
reference_type
scores
url https://www.debian.org/security/2018/dsa-4088
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1531397
reference_id 1531397
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1531397
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-1000422
reference_id CVE-2017-1000422
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-1000422
16
reference_url https://security.gentoo.org/glsa/201804-14
reference_id GLSA-201804-14
reference_type
scores
url https://security.gentoo.org/glsa/201804-14
17
reference_url https://usn.ubuntu.com/3532-1/
reference_id USN-3532-1
reference_type
scores
url https://usn.ubuntu.com/3532-1/
fixed_packages
0
url pkg:deb/debian/gdk-pixbuf@2.31.1-2%2Bdeb8u7
purl pkg:deb/debian/gdk-pixbuf@2.31.1-2%2Bdeb8u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ytk-9srj-zfff
1
vulnerability VCID-2a49-ryer-vkhd
2
vulnerability VCID-37b2-h2nn-ufa8
3
vulnerability VCID-4jf2-xww4-mfau
4
vulnerability VCID-4zm2-zv71-jfat
5
vulnerability VCID-7cp9-37h3-tkhq
6
vulnerability VCID-7hwy-9gdx-rya8
7
vulnerability VCID-drq5-6jps-skax
8
vulnerability VCID-hfkx-cat3-puf8
9
vulnerability VCID-juwv-p63q-8ffy
10
vulnerability VCID-jzz2-x2gk-8kf1
11
vulnerability VCID-k2ph-py3f-aycu
12
vulnerability VCID-ku5p-8cre-xkee
13
vulnerability VCID-pf79-yf2z-syem
14
vulnerability VCID-q8wp-65d8-yqcr
15
vulnerability VCID-qwv5-ntpt-mbbp
16
vulnerability VCID-rzj1-83cd-4yer
17
vulnerability VCID-vcfh-3p9e-4uc3
18
vulnerability VCID-xg3j-c698-3kgu
19
vulnerability VCID-y1sm-7uec-1bc5
20
vulnerability VCID-zu3p-941y-nydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.31.1-2%252Bdeb8u7
1
url pkg:deb/debian/gdk-pixbuf@2.36.5-2%2Bdeb9u2
purl pkg:deb/debian/gdk-pixbuf@2.36.5-2%2Bdeb9u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1ytk-9srj-zfff
1
vulnerability VCID-2a49-ryer-vkhd
2
vulnerability VCID-37b2-h2nn-ufa8
3
vulnerability VCID-4jf2-xww4-mfau
4
vulnerability VCID-4zm2-zv71-jfat
5
vulnerability VCID-7cp9-37h3-tkhq
6
vulnerability VCID-juwv-p63q-8ffy
7
vulnerability VCID-jzz2-x2gk-8kf1
8
vulnerability VCID-pf79-yf2z-syem
9
vulnerability VCID-q8wp-65d8-yqcr
10
vulnerability VCID-vcfh-3p9e-4uc3
11
vulnerability VCID-xg3j-c698-3kgu
12
vulnerability VCID-y1sm-7uec-1bc5
13
vulnerability VCID-zu3p-941y-nydy
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.36.5-2%252Bdeb9u2
2
url pkg:deb/debian/gdk-pixbuf@2.38.1%2Bdfsg-1
purl pkg:deb/debian/gdk-pixbuf@2.38.1%2Bdfsg-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2a49-ryer-vkhd
1
vulnerability VCID-4zm2-zv71-jfat
2
vulnerability VCID-juwv-p63q-8ffy
3
vulnerability VCID-jzz2-x2gk-8kf1
4
vulnerability VCID-pf79-yf2z-syem
5
vulnerability VCID-vcfh-3p9e-4uc3
6
vulnerability VCID-xg3j-c698-3kgu
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.38.1%252Bdfsg-1
aliases CVE-2017-1000422
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zu3p-941y-nydy
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@0.17.0-2woody2