Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libwmf@0.2.8.4-2
Typedeb
Namespacedebian
Namelibwmf
Version0.2.8.4-2
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version0.2.8.4-10.6
Latest_non_vulnerable_version0.2.8.4-10.6
Affected_by_vulnerabilities
0
url VCID-5qdc-jjh5-gfba
vulnerability_id VCID-5qdc-jjh5-gfba
summary
Multiple vulnerabilities have been found in libwmf allowing remote
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4588.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4588.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4588
reference_id
reference_type
scores
0
value 0.05715
scoring_system epss
scoring_elements 0.90441
published_at 2026-04-21T12:55:00Z
1
value 0.05715
scoring_system epss
scoring_elements 0.90388
published_at 2026-04-01T12:55:00Z
2
value 0.05715
scoring_system epss
scoring_elements 0.90391
published_at 2026-04-02T12:55:00Z
3
value 0.05715
scoring_system epss
scoring_elements 0.90403
published_at 2026-04-04T12:55:00Z
4
value 0.05715
scoring_system epss
scoring_elements 0.90407
published_at 2026-04-07T12:55:00Z
5
value 0.05715
scoring_system epss
scoring_elements 0.90421
published_at 2026-04-08T12:55:00Z
6
value 0.05715
scoring_system epss
scoring_elements 0.90428
published_at 2026-04-13T12:55:00Z
7
value 0.05715
scoring_system epss
scoring_elements 0.90435
published_at 2026-04-12T12:55:00Z
8
value 0.05715
scoring_system epss
scoring_elements 0.90443
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4588
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1272993
reference_id 1272993
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1272993
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787644
reference_id 787644
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787644
8
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
9
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
10
reference_url https://security.gentoo.org/glsa/201602-03
reference_id GLSA-201602-03
reference_type
scores
url https://security.gentoo.org/glsa/201602-03
11
reference_url https://access.redhat.com/errata/RHSA-2015:1917
reference_id RHSA-2015:1917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1917
12
reference_url https://usn.ubuntu.com/2670-1/
reference_id USN-2670-1
reference_type
scores
url https://usn.ubuntu.com/2670-1/
fixed_packages
0
url pkg:deb/debian/libwmf@0.2.8.4-10.3%2Bdeb7u1
purl pkg:deb/debian/libwmf@0.2.8.4-10.3%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5qdc-jjh5-gfba
1
vulnerability VCID-5we4-7e6c-7bb6
2
vulnerability VCID-9fnx-1dty-4yg9
3
vulnerability VCID-evjq-akma-sfhf
4
vulnerability VCID-zc4g-jn49-63gd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-10.3%252Bdeb7u1
1
url pkg:deb/debian/libwmf@0.2.8.4-10.3%2Bdeb8u2
purl pkg:deb/debian/libwmf@0.2.8.4-10.3%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5qdc-jjh5-gfba
1
vulnerability VCID-5we4-7e6c-7bb6
2
vulnerability VCID-9fnx-1dty-4yg9
3
vulnerability VCID-evjq-akma-sfhf
4
vulnerability VCID-zc4g-jn49-63gd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-10.3%252Bdeb8u2
2
url pkg:deb/debian/libwmf@0.2.8.4-10.6
purl pkg:deb/debian/libwmf@0.2.8.4-10.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-10.6
aliases CVE-2015-4588
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5qdc-jjh5-gfba
1
url VCID-5we4-7e6c-7bb6
vulnerability_id VCID-5we4-7e6c-7bb6
summary
Multiple vulnerabilities have been found in libwmf allowing remote
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4696.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4696.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4696
reference_id
reference_type
scores
0
value 0.01958
scoring_system epss
scoring_elements 0.83528
published_at 2026-04-21T12:55:00Z
1
value 0.01958
scoring_system epss
scoring_elements 0.83426
published_at 2026-04-01T12:55:00Z
2
value 0.01958
scoring_system epss
scoring_elements 0.83439
published_at 2026-04-02T12:55:00Z
3
value 0.01958
scoring_system epss
scoring_elements 0.83453
published_at 2026-04-04T12:55:00Z
4
value 0.01958
scoring_system epss
scoring_elements 0.83452
published_at 2026-04-07T12:55:00Z
5
value 0.01958
scoring_system epss
scoring_elements 0.83476
published_at 2026-04-08T12:55:00Z
6
value 0.01958
scoring_system epss
scoring_elements 0.83486
published_at 2026-04-09T12:55:00Z
7
value 0.01958
scoring_system epss
scoring_elements 0.835
published_at 2026-04-11T12:55:00Z
8
value 0.01958
scoring_system epss
scoring_elements 0.83494
published_at 2026-04-12T12:55:00Z
9
value 0.01958
scoring_system epss
scoring_elements 0.8349
published_at 2026-04-13T12:55:00Z
10
value 0.01958
scoring_system epss
scoring_elements 0.83526
published_at 2026-04-16T12:55:00Z
11
value 0.01958
scoring_system epss
scoring_elements 0.83527
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4696
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1235669
reference_id 1235669
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1235669
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784192
reference_id 784192
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784192
8
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
9
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
10
reference_url https://security.gentoo.org/glsa/201602-03
reference_id GLSA-201602-03
reference_type
scores
url https://security.gentoo.org/glsa/201602-03
11
reference_url https://access.redhat.com/errata/RHSA-2015:1917
reference_id RHSA-2015:1917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1917
12
reference_url https://usn.ubuntu.com/2670-1/
reference_id USN-2670-1
reference_type
scores
url https://usn.ubuntu.com/2670-1/
fixed_packages
0
url pkg:deb/debian/libwmf@0.2.8.4-10.3%2Bdeb7u1
purl pkg:deb/debian/libwmf@0.2.8.4-10.3%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5qdc-jjh5-gfba
1
vulnerability VCID-5we4-7e6c-7bb6
2
vulnerability VCID-9fnx-1dty-4yg9
3
vulnerability VCID-evjq-akma-sfhf
4
vulnerability VCID-zc4g-jn49-63gd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-10.3%252Bdeb7u1
1
url pkg:deb/debian/libwmf@0.2.8.4-10.3%2Bdeb8u2
purl pkg:deb/debian/libwmf@0.2.8.4-10.3%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5qdc-jjh5-gfba
1
vulnerability VCID-5we4-7e6c-7bb6
2
vulnerability VCID-9fnx-1dty-4yg9
3
vulnerability VCID-evjq-akma-sfhf
4
vulnerability VCID-zc4g-jn49-63gd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-10.3%252Bdeb8u2
2
url pkg:deb/debian/libwmf@0.2.8.4-10.6
purl pkg:deb/debian/libwmf@0.2.8.4-10.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-10.6
aliases CVE-2015-4696
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5we4-7e6c-7bb6
2
url VCID-9fnx-1dty-4yg9
vulnerability_id VCID-9fnx-1dty-4yg9
summary
Multiple vulnerabilities have been found in libwmf allowing remote
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0848.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0848.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0848
reference_id
reference_type
scores
0
value 0.04681
scoring_system epss
scoring_elements 0.89347
published_at 2026-04-21T12:55:00Z
1
value 0.04681
scoring_system epss
scoring_elements 0.89292
published_at 2026-04-01T12:55:00Z
2
value 0.04681
scoring_system epss
scoring_elements 0.89298
published_at 2026-04-02T12:55:00Z
3
value 0.04681
scoring_system epss
scoring_elements 0.89312
published_at 2026-04-04T12:55:00Z
4
value 0.04681
scoring_system epss
scoring_elements 0.89313
published_at 2026-04-07T12:55:00Z
5
value 0.04681
scoring_system epss
scoring_elements 0.8933
published_at 2026-04-08T12:55:00Z
6
value 0.04681
scoring_system epss
scoring_elements 0.89335
published_at 2026-04-09T12:55:00Z
7
value 0.04681
scoring_system epss
scoring_elements 0.89343
published_at 2026-04-11T12:55:00Z
8
value 0.04681
scoring_system epss
scoring_elements 0.8934
published_at 2026-04-12T12:55:00Z
9
value 0.04681
scoring_system epss
scoring_elements 0.89337
published_at 2026-04-13T12:55:00Z
10
value 0.04681
scoring_system epss
scoring_elements 0.89351
published_at 2026-04-16T12:55:00Z
11
value 0.04681
scoring_system epss
scoring_elements 0.8935
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0848
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1227243
reference_id 1227243
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1227243
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787644
reference_id 787644
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=787644
8
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
9
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
10
reference_url https://security.gentoo.org/glsa/201602-03
reference_id GLSA-201602-03
reference_type
scores
url https://security.gentoo.org/glsa/201602-03
11
reference_url https://access.redhat.com/errata/RHSA-2015:1917
reference_id RHSA-2015:1917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1917
12
reference_url https://usn.ubuntu.com/2670-1/
reference_id USN-2670-1
reference_type
scores
url https://usn.ubuntu.com/2670-1/
fixed_packages
0
url pkg:deb/debian/libwmf@0.2.8.4-10.3%2Bdeb7u1
purl pkg:deb/debian/libwmf@0.2.8.4-10.3%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5qdc-jjh5-gfba
1
vulnerability VCID-5we4-7e6c-7bb6
2
vulnerability VCID-9fnx-1dty-4yg9
3
vulnerability VCID-evjq-akma-sfhf
4
vulnerability VCID-zc4g-jn49-63gd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-10.3%252Bdeb7u1
1
url pkg:deb/debian/libwmf@0.2.8.4-10.3%2Bdeb8u2
purl pkg:deb/debian/libwmf@0.2.8.4-10.3%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5qdc-jjh5-gfba
1
vulnerability VCID-5we4-7e6c-7bb6
2
vulnerability VCID-9fnx-1dty-4yg9
3
vulnerability VCID-evjq-akma-sfhf
4
vulnerability VCID-zc4g-jn49-63gd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-10.3%252Bdeb8u2
2
url pkg:deb/debian/libwmf@0.2.8.4-10.6
purl pkg:deb/debian/libwmf@0.2.8.4-10.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-10.6
aliases CVE-2015-0848
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9fnx-1dty-4yg9
3
url VCID-evjq-akma-sfhf
vulnerability_id VCID-evjq-akma-sfhf
summary libwmf: Memory allocation failure in wmf_malloc
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9011.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9011.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9011
reference_id
reference_type
scores
0
value 0.00491
scoring_system epss
scoring_elements 0.6553
published_at 2026-04-01T12:55:00Z
1
value 0.00491
scoring_system epss
scoring_elements 0.65664
published_at 2026-04-18T12:55:00Z
2
value 0.00491
scoring_system epss
scoring_elements 0.6566
published_at 2026-04-11T12:55:00Z
3
value 0.00491
scoring_system epss
scoring_elements 0.65645
published_at 2026-04-21T12:55:00Z
4
value 0.00491
scoring_system epss
scoring_elements 0.65616
published_at 2026-04-13T12:55:00Z
5
value 0.00491
scoring_system epss
scoring_elements 0.65651
published_at 2026-04-16T12:55:00Z
6
value 0.00491
scoring_system epss
scoring_elements 0.65578
published_at 2026-04-02T12:55:00Z
7
value 0.00491
scoring_system epss
scoring_elements 0.65608
published_at 2026-04-04T12:55:00Z
8
value 0.00491
scoring_system epss
scoring_elements 0.65575
published_at 2026-04-07T12:55:00Z
9
value 0.00491
scoring_system epss
scoring_elements 0.65626
published_at 2026-04-08T12:55:00Z
10
value 0.00491
scoring_system epss
scoring_elements 0.65639
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9011
2
reference_url https://blogs.gentoo.org/ago/2016/10/18/libwmf-memory-allocation-failure-in-wmf_malloc-api-c
reference_id
reference_type
scores
url https://blogs.gentoo.org/ago/2016/10/18/libwmf-memory-allocation-failure-in-wmf_malloc-api-c
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9011
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url http://www.openwall.com/lists/oss-security/2016/10/25/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2016/10/25/1
6
reference_url http://www.securityfocus.com/bid/93860
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/93860
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1388450
reference_id 1388450
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1388450
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842090
reference_id 842090
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=842090
9
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
10
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wvware:libwmf:0.2.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wvware:libwmf:0.2.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wvware:libwmf:0.2.8.4:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-9011
reference_id CVE-2016-9011
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2016-9011
fixed_packages
0
url pkg:deb/debian/libwmf@0.2.8.4-10.6
purl pkg:deb/debian/libwmf@0.2.8.4-10.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-10.6
aliases CVE-2016-9011
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-evjq-akma-sfhf
4
url VCID-kym4-etgv-u3bv
vulnerability_id VCID-kym4-etgv-u3bv
summary
libwmf bundles an old GD version which contains a "use-after-free"
    vulnerability.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1364.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1364.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1364
reference_id
reference_type
scores
0
value 0.03145
scoring_system epss
scoring_elements 0.86907
published_at 2026-04-21T12:55:00Z
1
value 0.03145
scoring_system epss
scoring_elements 0.8683
published_at 2026-04-01T12:55:00Z
2
value 0.03145
scoring_system epss
scoring_elements 0.8684
published_at 2026-04-02T12:55:00Z
3
value 0.03145
scoring_system epss
scoring_elements 0.8686
published_at 2026-04-04T12:55:00Z
4
value 0.03145
scoring_system epss
scoring_elements 0.86854
published_at 2026-04-07T12:55:00Z
5
value 0.03145
scoring_system epss
scoring_elements 0.86874
published_at 2026-04-08T12:55:00Z
6
value 0.03145
scoring_system epss
scoring_elements 0.86882
published_at 2026-04-09T12:55:00Z
7
value 0.03145
scoring_system epss
scoring_elements 0.86895
published_at 2026-04-11T12:55:00Z
8
value 0.03145
scoring_system epss
scoring_elements 0.8689
published_at 2026-04-12T12:55:00Z
9
value 0.03145
scoring_system epss
scoring_elements 0.86885
published_at 2026-04-13T12:55:00Z
10
value 0.03145
scoring_system epss
scoring_elements 0.86902
published_at 2026-04-16T12:55:00Z
11
value 0.03145
scoring_system epss
scoring_elements 0.86908
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1364
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1364
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=496864
reference_id 496864
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=496864
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526434
reference_id 526434
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=526434
5
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
6
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
7
reference_url https://security.gentoo.org/glsa/200907-01
reference_id GLSA-200907-01
reference_type
scores
url https://security.gentoo.org/glsa/200907-01
8
reference_url https://access.redhat.com/errata/RHSA-2009:0457
reference_id RHSA-2009:0457
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0457
9
reference_url https://usn.ubuntu.com/769-1/
reference_id USN-769-1
reference_type
scores
url https://usn.ubuntu.com/769-1/
fixed_packages
0
url pkg:deb/debian/libwmf@0.2.8.4-6.1
purl pkg:deb/debian/libwmf@0.2.8.4-6.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5qdc-jjh5-gfba
1
vulnerability VCID-5we4-7e6c-7bb6
2
vulnerability VCID-9fnx-1dty-4yg9
3
vulnerability VCID-evjq-akma-sfhf
4
vulnerability VCID-zc4g-jn49-63gd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-6.1
aliases CVE-2009-1364
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kym4-etgv-u3bv
5
url VCID-zc4g-jn49-63gd
vulnerability_id VCID-zc4g-jn49-63gd
summary
Multiple vulnerabilities have been found in libwmf allowing remote
    attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4695.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4695.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4695
reference_id
reference_type
scores
0
value 0.01549
scoring_system epss
scoring_elements 0.81448
published_at 2026-04-21T12:55:00Z
1
value 0.01549
scoring_system epss
scoring_elements 0.81346
published_at 2026-04-01T12:55:00Z
2
value 0.01549
scoring_system epss
scoring_elements 0.81355
published_at 2026-04-02T12:55:00Z
3
value 0.01549
scoring_system epss
scoring_elements 0.81377
published_at 2026-04-04T12:55:00Z
4
value 0.01549
scoring_system epss
scoring_elements 0.81375
published_at 2026-04-07T12:55:00Z
5
value 0.01549
scoring_system epss
scoring_elements 0.81403
published_at 2026-04-08T12:55:00Z
6
value 0.01549
scoring_system epss
scoring_elements 0.81408
published_at 2026-04-09T12:55:00Z
7
value 0.01549
scoring_system epss
scoring_elements 0.81429
published_at 2026-04-11T12:55:00Z
8
value 0.01549
scoring_system epss
scoring_elements 0.81417
published_at 2026-04-12T12:55:00Z
9
value 0.01549
scoring_system epss
scoring_elements 0.81409
published_at 2026-04-13T12:55:00Z
10
value 0.01549
scoring_system epss
scoring_elements 0.81446
published_at 2026-04-16T12:55:00Z
11
value 0.01549
scoring_system epss
scoring_elements 0.81447
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4695
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1235665
reference_id 1235665
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1235665
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784205
reference_id 784205
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784205
8
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
9
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
10
reference_url https://security.gentoo.org/glsa/201602-03
reference_id GLSA-201602-03
reference_type
scores
url https://security.gentoo.org/glsa/201602-03
11
reference_url https://access.redhat.com/errata/RHSA-2015:1917
reference_id RHSA-2015:1917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1917
12
reference_url https://usn.ubuntu.com/2670-1/
reference_id USN-2670-1
reference_type
scores
url https://usn.ubuntu.com/2670-1/
fixed_packages
0
url pkg:deb/debian/libwmf@0.2.8.4-10.3%2Bdeb7u1
purl pkg:deb/debian/libwmf@0.2.8.4-10.3%2Bdeb7u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5qdc-jjh5-gfba
1
vulnerability VCID-5we4-7e6c-7bb6
2
vulnerability VCID-9fnx-1dty-4yg9
3
vulnerability VCID-evjq-akma-sfhf
4
vulnerability VCID-zc4g-jn49-63gd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-10.3%252Bdeb7u1
1
url pkg:deb/debian/libwmf@0.2.8.4-10.3%2Bdeb8u2
purl pkg:deb/debian/libwmf@0.2.8.4-10.3%2Bdeb8u2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5qdc-jjh5-gfba
1
vulnerability VCID-5we4-7e6c-7bb6
2
vulnerability VCID-9fnx-1dty-4yg9
3
vulnerability VCID-evjq-akma-sfhf
4
vulnerability VCID-zc4g-jn49-63gd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-10.3%252Bdeb8u2
2
url pkg:deb/debian/libwmf@0.2.8.4-10.6
purl pkg:deb/debian/libwmf@0.2.8.4-10.6
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-10.6
aliases CVE-2015-4695
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zc4g-jn49-63gd
Fixing_vulnerabilities
0
url VCID-v3cm-pjc9-6bhq
vulnerability_id VCID-v3cm-pjc9-6bhq
summary
libwmf is vulnerable to an integer overflow potentially resulting in the
    execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3376.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3376.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-3376
reference_id
reference_type
scores
0
value 0.12232
scoring_system epss
scoring_elements 0.93876
published_at 2026-04-21T12:55:00Z
1
value 0.12232
scoring_system epss
scoring_elements 0.93808
published_at 2026-04-01T12:55:00Z
2
value 0.12232
scoring_system epss
scoring_elements 0.93817
published_at 2026-04-02T12:55:00Z
3
value 0.12232
scoring_system epss
scoring_elements 0.93826
published_at 2026-04-04T12:55:00Z
4
value 0.12232
scoring_system epss
scoring_elements 0.93829
published_at 2026-04-07T12:55:00Z
5
value 0.12232
scoring_system epss
scoring_elements 0.93838
published_at 2026-04-08T12:55:00Z
6
value 0.12232
scoring_system epss
scoring_elements 0.93841
published_at 2026-04-09T12:55:00Z
7
value 0.12232
scoring_system epss
scoring_elements 0.93846
published_at 2026-04-13T12:55:00Z
8
value 0.12232
scoring_system epss
scoring_elements 0.93869
published_at 2026-04-16T12:55:00Z
9
value 0.12232
scoring_system epss
scoring_elements 0.93875
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-3376
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3376
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3376
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618139
reference_id 1618139
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618139
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=381538
reference_id 381538
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=381538
5
reference_url https://security.archlinux.org/ASA-201701-1
reference_id ASA-201701-1
reference_type
scores
url https://security.archlinux.org/ASA-201701-1
6
reference_url https://security.archlinux.org/AVG-16
reference_id AVG-16
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-16
7
reference_url https://security.gentoo.org/glsa/200608-17
reference_id GLSA-200608-17
reference_type
scores
url https://security.gentoo.org/glsa/200608-17
8
reference_url https://access.redhat.com/errata/RHSA-2006:0597
reference_id RHSA-2006:0597
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0597
9
reference_url https://usn.ubuntu.com/333-1/
reference_id USN-333-1
reference_type
scores
url https://usn.ubuntu.com/333-1/
fixed_packages
0
url pkg:deb/debian/libwmf@0.2.8.4-2
purl pkg:deb/debian/libwmf@0.2.8.4-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5qdc-jjh5-gfba
1
vulnerability VCID-5we4-7e6c-7bb6
2
vulnerability VCID-9fnx-1dty-4yg9
3
vulnerability VCID-evjq-akma-sfhf
4
vulnerability VCID-kym4-etgv-u3bv
5
vulnerability VCID-zc4g-jn49-63gd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-2
aliases CVE-2006-3376
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v3cm-pjc9-6bhq
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libwmf@0.2.8.4-2