Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/media-gfx/povray@3.6.1-r4
Typeebuild
Namespacemedia-gfx
Namepovray
Version3.6.1-r4
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-737b-skzy-rybh
vulnerability_id VCID-737b-skzy-rybh
summary
POV-Ray includes a version of libpng that might allow for the execution of
    arbitrary code when reading a specially crafted PNG file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0481.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-0481.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-0481
reference_id
reference_type
scores
0
value 0.02064
scoring_system epss
scoring_elements 0.83855
published_at 2026-04-01T12:55:00Z
1
value 0.02064
scoring_system epss
scoring_elements 0.83869
published_at 2026-04-02T12:55:00Z
2
value 0.02064
scoring_system epss
scoring_elements 0.83884
published_at 2026-04-04T12:55:00Z
3
value 0.02064
scoring_system epss
scoring_elements 0.83886
published_at 2026-04-07T12:55:00Z
4
value 0.02064
scoring_system epss
scoring_elements 0.83909
published_at 2026-04-08T12:55:00Z
5
value 0.02064
scoring_system epss
scoring_elements 0.83916
published_at 2026-04-09T12:55:00Z
6
value 0.02064
scoring_system epss
scoring_elements 0.83932
published_at 2026-04-11T12:55:00Z
7
value 0.02064
scoring_system epss
scoring_elements 0.83927
published_at 2026-04-12T12:55:00Z
8
value 0.02064
scoring_system epss
scoring_elements 0.83922
published_at 2026-04-13T12:55:00Z
9
value 0.02064
scoring_system epss
scoring_elements 0.83948
published_at 2026-04-18T12:55:00Z
10
value 0.02064
scoring_system epss
scoring_elements 0.8395
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-0481
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1618003
reference_id 1618003
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1618003
3
reference_url https://security.gentoo.org/glsa/200812-15
reference_id GLSA-200812-15
reference_type
scores
url https://security.gentoo.org/glsa/200812-15
4
reference_url https://access.redhat.com/errata/RHSA-2006:0205
reference_id RHSA-2006:0205
reference_type
scores
url https://access.redhat.com/errata/RHSA-2006:0205
fixed_packages
0
url pkg:ebuild/media-gfx/povray@3.6.1-r4
purl pkg:ebuild/media-gfx/povray@3.6.1-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/povray@3.6.1-r4
aliases CVE-2006-0481
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-737b-skzy-rybh
1
url VCID-p6d5-4vgm-5udm
vulnerability_id VCID-p6d5-4vgm-5udm
summary
POV-Ray includes a version of libpng that might allow for the execution of
    arbitrary code when reading a specially crafted PNG file
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2004-0768
reference_id
reference_type
scores
0
value 0.04102
scoring_system epss
scoring_elements 0.88545
published_at 2026-04-01T12:55:00Z
1
value 0.04102
scoring_system epss
scoring_elements 0.88554
published_at 2026-04-02T12:55:00Z
2
value 0.04102
scoring_system epss
scoring_elements 0.88571
published_at 2026-04-04T12:55:00Z
3
value 0.04102
scoring_system epss
scoring_elements 0.88574
published_at 2026-04-07T12:55:00Z
4
value 0.04102
scoring_system epss
scoring_elements 0.88593
published_at 2026-04-08T12:55:00Z
5
value 0.04102
scoring_system epss
scoring_elements 0.88597
published_at 2026-04-09T12:55:00Z
6
value 0.04102
scoring_system epss
scoring_elements 0.88609
published_at 2026-04-21T12:55:00Z
7
value 0.04102
scoring_system epss
scoring_elements 0.88601
published_at 2026-04-12T12:55:00Z
8
value 0.04102
scoring_system epss
scoring_elements 0.88602
published_at 2026-04-13T12:55:00Z
9
value 0.04102
scoring_system epss
scoring_elements 0.88615
published_at 2026-04-16T12:55:00Z
10
value 0.04102
scoring_system epss
scoring_elements 0.88612
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2004-0768
1
reference_url https://security.gentoo.org/glsa/200812-15
reference_id GLSA-200812-15
reference_type
scores
url https://security.gentoo.org/glsa/200812-15
fixed_packages
0
url pkg:ebuild/media-gfx/povray@3.6.1-r4
purl pkg:ebuild/media-gfx/povray@3.6.1-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/povray@3.6.1-r4
aliases CVE-2004-0768
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p6d5-4vgm-5udm
2
url VCID-x2nz-j2k5-wba6
vulnerability_id VCID-x2nz-j2k5-wba6
summary
POV-Ray includes a version of libpng that might allow for the execution of
    arbitrary code when reading a specially crafted PNG file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3964.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3964.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-3964
reference_id
reference_type
scores
0
value 0.01708
scoring_system epss
scoring_elements 0.82362
published_at 2026-04-21T12:55:00Z
1
value 0.01708
scoring_system epss
scoring_elements 0.82257
published_at 2026-04-01T12:55:00Z
2
value 0.01708
scoring_system epss
scoring_elements 0.82269
published_at 2026-04-02T12:55:00Z
3
value 0.01708
scoring_system epss
scoring_elements 0.82289
published_at 2026-04-04T12:55:00Z
4
value 0.01708
scoring_system epss
scoring_elements 0.82283
published_at 2026-04-07T12:55:00Z
5
value 0.01708
scoring_system epss
scoring_elements 0.8231
published_at 2026-04-08T12:55:00Z
6
value 0.01708
scoring_system epss
scoring_elements 0.82317
published_at 2026-04-09T12:55:00Z
7
value 0.01708
scoring_system epss
scoring_elements 0.82337
published_at 2026-04-11T12:55:00Z
8
value 0.01708
scoring_system epss
scoring_elements 0.82331
published_at 2026-04-12T12:55:00Z
9
value 0.01708
scoring_system epss
scoring_elements 0.82325
published_at 2026-04-13T12:55:00Z
10
value 0.01708
scoring_system epss
scoring_elements 0.8236
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-3964
2
reference_url http://secunia.com/advisories/31781
reference_id
reference_type
scores
url http://secunia.com/advisories/31781
3
reference_url http://secunia.com/advisories/33137
reference_id
reference_type
scores
url http://secunia.com/advisories/33137
4
reference_url http://secunia.com/advisories/35302
reference_id
reference_type
scores
url http://secunia.com/advisories/35302
5
reference_url http://secunia.com/advisories/35386
reference_id
reference_type
scores
url http://secunia.com/advisories/35386
6
reference_url http://security.gentoo.org/glsa/glsa-200812-15.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-200812-15.xml
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/44928
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/44928
8
reference_url http://sourceforge.net/mailarchive/forum.php?thread_name=e56ccc8f0809180317u6a5306fg14683947affb3e1b%40mail.gmail.com&forum_name=png-mng-implement
reference_id
reference_type
scores
url http://sourceforge.net/mailarchive/forum.php?thread_name=e56ccc8f0809180317u6a5306fg14683947affb3e1b%40mail.gmail.com&forum_name=png-mng-implement
9
reference_url http://sourceforge.net/project/shownotes.php?group_id=5624&release_id=624517
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?group_id=5624&release_id=624517
10
reference_url http://sourceforge.net/project/shownotes.php?release_id=624518
reference_id
reference_type
scores
url http://sourceforge.net/project/shownotes.php?release_id=624518
11
reference_url http://sourceforge.net/tracker/index.php?func=detail&aid=2095669&group_id=5624&atid=105624
reference_id
reference_type
scores
url http://sourceforge.net/tracker/index.php?func=detail&aid=2095669&group_id=5624&atid=105624
12
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1
13
reference_url http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1
reference_id
reference_type
scores
url http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1
14
reference_url http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm
reference_id
reference_type
scores
url http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm
15
reference_url http://www.kb.cert.org/vuls/id/889484
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/889484
16
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:051
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:051
17
reference_url http://www.openwall.com/lists/oss-security/2008/09/09/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/09/09/3
18
reference_url http://www.openwall.com/lists/oss-security/2008/09/09/8
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2008/09/09/8
19
reference_url http://www.securityfocus.com/bid/31049
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/31049
20
reference_url http://www.vupen.com/english/advisories/2008/2512
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2008/2512
21
reference_url http://www.vupen.com/english/advisories/2009/1462
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1462
22
reference_url http://www.vupen.com/english/advisories/2009/1560
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2009/1560
23
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=461599
reference_id 461599
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=461599
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta1:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta10:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta10:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta11:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta11:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta12:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta12:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta12:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta13:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta13:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta14:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta14:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta14:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta15:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta15:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta16:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta16:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta16:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta17:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta17:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta17:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta18:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta18:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta18:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta19:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta19:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta19:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta2:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta20:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta20:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta21:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta21:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta21:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta22:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta22:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta22:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta23:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta23:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta23:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta24:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta24:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta24:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta25:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta25:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta26:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta26:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta26:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta27:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta27:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta27:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta28:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta28:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta28:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta29:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta29:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta29:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta3:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta30:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta30:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta30:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta31:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta31:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta31:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta32:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta32:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta32:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta33:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta33:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta33:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta4:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta5:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta6:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta6:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta7:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta7:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta8:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta8:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta8:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta9:*:*:*:*:*:*
reference_id cpe:2.3:a:libpng:libpng:1.4.0:beta9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta9:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-3964
reference_id CVE-2008-3964
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-3964
59
reference_url https://security.gentoo.org/glsa/200812-15
reference_id GLSA-200812-15
reference_type
scores
url https://security.gentoo.org/glsa/200812-15
60
reference_url https://usn.ubuntu.com/730-1/
reference_id USN-730-1
reference_type
scores
url https://usn.ubuntu.com/730-1/
fixed_packages
0
url pkg:ebuild/media-gfx/povray@3.6.1-r4
purl pkg:ebuild/media-gfx/povray@3.6.1-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/povray@3.6.1-r4
aliases CVE-2008-3964
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x2nz-j2k5-wba6
3
url VCID-ybeh-2tps-rfek
vulnerability_id VCID-ybeh-2tps-rfek
summary
POV-Ray includes a version of libpng that might allow for the execution of
    arbitrary code when reading a specially crafted PNG file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3334.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3334.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-3334
reference_id
reference_type
scores
0
value 0.01752
scoring_system epss
scoring_elements 0.82499
published_at 2026-04-01T12:55:00Z
1
value 0.01752
scoring_system epss
scoring_elements 0.82513
published_at 2026-04-02T12:55:00Z
2
value 0.01752
scoring_system epss
scoring_elements 0.82528
published_at 2026-04-04T12:55:00Z
3
value 0.01752
scoring_system epss
scoring_elements 0.82525
published_at 2026-04-07T12:55:00Z
4
value 0.01752
scoring_system epss
scoring_elements 0.82551
published_at 2026-04-08T12:55:00Z
5
value 0.01752
scoring_system epss
scoring_elements 0.82558
published_at 2026-04-09T12:55:00Z
6
value 0.01752
scoring_system epss
scoring_elements 0.82576
published_at 2026-04-11T12:55:00Z
7
value 0.01752
scoring_system epss
scoring_elements 0.8257
published_at 2026-04-12T12:55:00Z
8
value 0.01752
scoring_system epss
scoring_elements 0.82564
published_at 2026-04-13T12:55:00Z
9
value 0.01752
scoring_system epss
scoring_elements 0.826
published_at 2026-04-16T12:55:00Z
10
value 0.01752
scoring_system epss
scoring_elements 0.82601
published_at 2026-04-18T12:55:00Z
11
value 0.01752
scoring_system epss
scoring_elements 0.82605
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-3334
2
reference_url https://security.gentoo.org/glsa/200607-06
reference_id GLSA-200607-06
reference_type
scores
url https://security.gentoo.org/glsa/200607-06
3
reference_url https://security.gentoo.org/glsa/200812-15
reference_id GLSA-200812-15
reference_type
scores
url https://security.gentoo.org/glsa/200812-15
fixed_packages
0
url pkg:ebuild/media-gfx/povray@3.6.1-r4
purl pkg:ebuild/media-gfx/povray@3.6.1-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/povray@3.6.1-r4
aliases CVE-2006-3334
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ybeh-2tps-rfek
4
url VCID-zv3m-jw5c-6ubn
vulnerability_id VCID-zv3m-jw5c-6ubn
summary
POV-Ray includes a version of libpng that might allow for the execution of
    arbitrary code when reading a specially crafted PNG file
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1382.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1382.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-1382
reference_id
reference_type
scores
0
value 0.0633
scoring_system epss
scoring_elements 0.90929
published_at 2026-04-01T12:55:00Z
1
value 0.0633
scoring_system epss
scoring_elements 0.90935
published_at 2026-04-02T12:55:00Z
2
value 0.0633
scoring_system epss
scoring_elements 0.90944
published_at 2026-04-04T12:55:00Z
3
value 0.0633
scoring_system epss
scoring_elements 0.90954
published_at 2026-04-07T12:55:00Z
4
value 0.0633
scoring_system epss
scoring_elements 0.90965
published_at 2026-04-08T12:55:00Z
5
value 0.0633
scoring_system epss
scoring_elements 0.90971
published_at 2026-04-09T12:55:00Z
6
value 0.0633
scoring_system epss
scoring_elements 0.9098
published_at 2026-04-13T12:55:00Z
7
value 0.0633
scoring_system epss
scoring_elements 0.90981
published_at 2026-04-12T12:55:00Z
8
value 0.0633
scoring_system epss
scoring_elements 0.91005
published_at 2026-04-21T12:55:00Z
9
value 0.0633
scoring_system epss
scoring_elements 0.91004
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-1382
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=441839
reference_id 441839
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=441839
3
reference_url https://security.gentoo.org/glsa/200804-15
reference_id GLSA-200804-15
reference_type
scores
url https://security.gentoo.org/glsa/200804-15
4
reference_url https://security.gentoo.org/glsa/200805-10
reference_id GLSA-200805-10
reference_type
scores
url https://security.gentoo.org/glsa/200805-10
5
reference_url https://security.gentoo.org/glsa/200812-15
reference_id GLSA-200812-15
reference_type
scores
url https://security.gentoo.org/glsa/200812-15
6
reference_url https://security.gentoo.org/glsa/201412-08
reference_id GLSA-201412-08
reference_type
scores
url https://security.gentoo.org/glsa/201412-08
7
reference_url https://access.redhat.com/errata/RHSA-2009:0333
reference_id RHSA-2009:0333
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0333
8
reference_url https://usn.ubuntu.com/730-1/
reference_id USN-730-1
reference_type
scores
url https://usn.ubuntu.com/730-1/
fixed_packages
0
url pkg:ebuild/media-gfx/povray@3.6.1-r4
purl pkg:ebuild/media-gfx/povray@3.6.1-r4
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/povray@3.6.1-r4
aliases CVE-2008-1382
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zv3m-jw5c-6ubn
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/media-gfx/povray@3.6.1-r4