Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/83565?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "type": "ebuild", "namespace": "kde-base", "name": "kget", "version": "6.7.1-r1", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "8.4.18-r1", "latest_non_vulnerable_version": "804.028-r2", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57992?format=api", "vulnerability_id": "VCID-146v-qr2a-kfe8", "summary": "This GLSA contains notification of vulnerabilities found in several\n Gentoo packages which have been fixed prior to January 1, 2011. The worst\n of these vulnerabilities could lead to local privilege escalation and\n remote code execution. Please see the package list and CVE identifiers\n below for more information.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2192.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2192.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2192", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09733", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09628", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09694", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09745", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09649", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.0972", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09769", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09782", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00033", "scoring_system": "epss", "scoring_elements": "0.09749", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2192" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2192", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2192" }, { "reference_url": "http://security.debian.org/pool/updates/main/p/pmount/pmount_0.9.18-2+lenny1.diff.gz", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.debian.org/pool/updates/main/p/pmount/pmount_0.9.18-2+lenny1.diff.gz" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2063", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2063" }, { "reference_url": "http://www.securityfocus.com/bid/40939", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/40939" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1520", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1520" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=605789", "reference_id": "605789", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=605789" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vincent_fourmond:pmount:0.9.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:vincent_fourmond:pmount:0.9.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vincent_fourmond:pmount:0.9.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2192", "reference_id": "CVE-2010-2192", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2192" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2010-2192" ], "risk_score": 0.8, "exploitability": "0.5", "weighted_severity": "1.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-146v-qr2a-kfe8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56081?format=api", "vulnerability_id": "VCID-1j6j-upj4-37hk", "summary": "A vulnerability has been discovered in libpng that allows for information\n disclosure.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2042.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2042.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2042", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03106", "scoring_system": "epss", "scoring_elements": "0.86818", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03106", "scoring_system": "epss", "scoring_elements": "0.86814", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03147", "scoring_system": "epss", "scoring_elements": "0.86864", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03147", "scoring_system": "epss", "scoring_elements": "0.86858", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03147", "scoring_system": "epss", "scoring_elements": "0.86835", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03147", "scoring_system": "epss", "scoring_elements": "0.86886", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03147", "scoring_system": "epss", "scoring_elements": "0.86899", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03147", "scoring_system": "epss", "scoring_elements": "0.86878", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03147", "scoring_system": "epss", "scoring_elements": "0.86845", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2042" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=504782", "reference_id": "504782", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=504782" }, { "reference_url": "https://security.gentoo.org/glsa/200906-01", "reference_id": "GLSA-200906-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200906-01" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0534", "reference_id": "RHSA-2010:0534", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0534" }, { "reference_url": "https://usn.ubuntu.com/913-1/", "reference_id": "USN-913-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/913-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2009-2042" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1j6j-upj4-37hk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57663?format=api", "vulnerability_id": "VCID-1yf3-td2x-xffn", "summary": "This GLSA contains notification of vulnerabilities found in several\n Gentoo packages which have been fixed prior to January 1, 2011. The worst\n of these vulnerabilities could lead to local privilege escalation and\n remote code execution. Please see the package list and CVE identifiers\n below for more information.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2624.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2624.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2624", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07318", "scoring_system": "epss", "scoring_elements": "0.91645", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07318", "scoring_system": "epss", "scoring_elements": "0.91653", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07318", "scoring_system": "epss", "scoring_elements": "0.91658", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07318", "scoring_system": "epss", "scoring_elements": "0.91667", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07318", "scoring_system": "epss", "scoring_elements": "0.9168", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07318", "scoring_system": "epss", "scoring_elements": "0.91686", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07318", "scoring_system": "epss", "scoring_elements": "0.9169", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07318", "scoring_system": "epss", "scoring_elements": "0.91691", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07318", "scoring_system": "epss", "scoring_elements": "0.91688", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-2624" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2624", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2624" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507263", "reference_id": "507263", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=507263" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=514711", "reference_id": "514711", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=514711" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" }, { "reference_url": "https://usn.ubuntu.com/889-1/", "reference_id": "USN-889-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/889-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2009-2624" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1yf3-td2x-xffn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51200?format=api", "vulnerability_id": "VCID-2598-x6rk-j3h1", "summary": "Multiple vulnerabilities were found in libpng, which might result in the\n execution of arbitrary code", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-6218.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-6218.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-6218", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02549", "scoring_system": "epss", "scoring_elements": "0.85482", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02549", "scoring_system": "epss", "scoring_elements": "0.85409", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02549", "scoring_system": "epss", "scoring_elements": "0.85421", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02549", "scoring_system": "epss", "scoring_elements": "0.85441", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02549", "scoring_system": "epss", "scoring_elements": "0.85445", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02549", "scoring_system": "epss", "scoring_elements": "0.85465", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02549", "scoring_system": "epss", "scoring_elements": "0.85474", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02549", "scoring_system": "epss", "scoring_elements": "0.85488", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02549", "scoring_system": "epss", "scoring_elements": "0.85486", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-6218" }, { "reference_url": "http://secunia.com/advisories/32418", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32418" }, { "reference_url": "http://secunia.com/advisories/34265", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34265" }, { "reference_url": "http://secunia.com/advisories/34320", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34320" }, { "reference_url": "http://secunia.com/advisories/34388", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34388" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200903-28.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200903-28.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46115", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46115" }, { "reference_url": "http://sourceforge.net/project/shownotes.php?release_id=635463&group_id=5624", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/project/shownotes.php?release_id=635463&group_id=5624" }, { "reference_url": "http://sourceforge.net/project/shownotes.php?release_id=635837", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/project/shownotes.php?release_id=635837" }, { "reference_url": "http://wiki.rpath.com/Advisories:rPSA-2009-0046", "reference_id": "", "reference_type": "", "scores": [], "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0046" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1750", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1750" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:133", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:133" }, { "reference_url": "http://www.securityfocus.com/archive/1/501767/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/501767/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/31920", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/31920" }, { "reference_url": "http://www.securitytracker.com/id?1021104", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1021104" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/2917", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/2917" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1837", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1837" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=468990", "reference_id": "468990", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=468990" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.0:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.0:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.0:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.0:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.0:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.0:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.0:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.0:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.0:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.0:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.0:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.0:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.0:beta5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.0:beta5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.0:beta5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.10:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.10:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.10:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.10:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.10:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.10:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.10:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.10:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.10:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.10:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.10:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.10:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.10:beta5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.10:beta5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.10:beta5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.10:beta6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.10:beta6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.10:beta6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.10:beta7:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.10:beta7:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.10:beta7:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.10:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.10:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.10:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.10:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.10:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.10:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.10:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.10:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.10:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.11:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.11:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.11:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.11:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.11:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.11:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.11:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.11:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.11:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.11:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.11:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.11:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.11:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.11:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.11:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.11:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.11:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.11:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.11:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.11:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.11:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.11:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.11:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.11:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.13:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.13:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.13:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.13:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.13:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.13:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.13:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.13:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.13:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.14:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.14:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.14:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.14:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.14:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.14:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.14:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.14:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.14:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.15:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.15:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.15:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.15:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.15:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.15:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.15:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.15:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.15:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.15:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.15:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.15:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.15:beta5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.15:beta5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.15:beta5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.15:beta6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.15:beta6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.15:beta6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.15:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.15:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.15:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.15:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.15:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.15:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.15:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.15:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.15:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.15:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.15:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.15:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.15:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.15:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.15:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.16:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.16:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.16:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.16:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.16:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.16:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.16:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.16:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.16:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.17:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.17:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.17:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.17:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.17:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.17:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.17:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.17:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.17:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.17:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.17:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.17:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.17:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.17:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.17:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.17:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.17:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.17:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta10:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta10:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta10:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta11:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta11:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta11:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta12:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta12:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta12:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta13:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta13:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta13:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta14:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta14:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta14:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta15:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta15:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta15:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta16:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta16:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta16:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta17:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta17:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta17:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta18:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta18:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta18:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta19:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta19:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta19:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta20:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta20:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta20:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta21:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta21:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta21:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta22:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta22:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta22:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta23:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta23:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta23:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta24:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta24:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta24:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta25:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta25:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta25:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta26:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta26:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta26:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta27:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta27:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta27:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta28:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta28:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta28:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta29:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta29:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta29:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta30:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta30:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta30:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta31:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta31:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta31:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta32:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta32:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta32:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta33:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta33:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta33:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta7:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta7:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta7:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta8:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta8:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta8:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta9:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:beta9:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:beta9:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:rc6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.19:rc6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.19:rc6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.1:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.1:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.1:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.1:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.1:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.1:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.1:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.1:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.1:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.1:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.1:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.1:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.1:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.1:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.1:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.1:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.1:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.1:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.20:beta01:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.20:beta01:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.20:beta01:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.20:beta02:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.20:beta02:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.20:beta02:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.20:beta03:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.20:beta03:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.20:beta03:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.20:beta04:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.20:beta04:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.20:beta04:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.20:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.20:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.20:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.20:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.20:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.20:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.20:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.20:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.20:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.20:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.20:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.20:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.20:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.20:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.20:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.20:rc6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.20:rc6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.20:rc6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.21:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.21:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.21:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.21:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.21:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.21:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.21:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.21:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.21:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.21:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.21:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.21:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.21:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.21:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.21:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.22:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.22:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.22:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.22:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.22:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.22:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.22:beta2-1.2.21:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.22:beta2-1.2.21:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.22:beta2-1.2.21:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.22:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.22:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.22:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.22:beta3-1.2.21:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.22:beta3-1.2.21:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.22:beta3-1.2.21:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.22:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.22:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.22:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.22:beta4-1.2.21:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.22:beta4-1.2.21:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.22:beta4-1.2.21:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.22:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.22:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.22:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.22:rc1-1.2.21:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.22:rc1-1.2.21:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.22:rc1-1.2.21:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.23:beta01:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.23:beta01:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.23:beta01:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.23:beta01-1.2.22:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.23:beta01-1.2.22:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.23:beta01-1.2.22:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.23:beta02:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.23:beta02:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.23:beta02:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.23:beta02-1.2.22:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.23:beta02-1.2.22:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.23:beta02-1.2.22:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.23:beta03:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.23:beta03:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.23:beta03:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.23:beta03-1.2.22:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.23:beta03-1.2.22:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.23:beta03-1.2.22:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.23:beta04:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.23:beta04:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.23:beta04:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.23:beta04-1.2.22:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.23:beta04-1.2.22:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.23:beta04-1.2.22:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.23:beta05:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.23:beta05:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.23:beta05:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.23:beta05-1.2.22:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.23:beta05-1.2.22:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.23:beta05-1.2.22:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.23:rc01:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.23:rc01:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.23:rc01:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.23:rc01-1.2.22:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.23:rc01-1.2.22:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.23:rc01-1.2.22:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.24:beta01:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.24:beta01:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.24:beta01:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.24:beta01-1.2.23:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.24:beta01-1.2.23:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.24:beta01-1.2.23:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.24:beta02:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.24:beta02:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.24:beta02:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.24:beta02-1.2.23:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.24:beta02-1.2.23:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.24:beta02-1.2.23:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.24:beta03:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.24:beta03:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.24:beta03:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.24:beta03-1.2.23:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.24:beta03-1.2.23:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.24:beta03-1.2.23:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.24:rc01:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.24:rc01:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.24:rc01:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.24:rc01-1.2.23:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.24:rc01-1.2.23:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.24:rc01-1.2.23:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.25:beta01:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.25:beta01:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.25:beta01:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.25:beta02:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.25:beta02:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.25:beta02:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.25:beta03:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.25:beta03:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.25:beta03:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.25:beta04:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.25:beta04:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.25:beta04:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.25:beta05:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.25:beta05:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.25:beta05:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.25:beta06:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.25:beta06:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.25:beta06:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.25:rc01:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.25:rc01:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.25:rc01:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.25:rc02:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.25:rc02:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.25:rc02:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.26:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.26:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.26:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.26:beta01:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.26:beta01:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.26:beta01:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.26:beta02:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.26:beta02:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.26:beta02:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.26:beta03:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.26:beta03:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.26:beta03:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.26:beta04:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.26:beta04:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.26:beta04:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.26:beta05:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.26:beta05:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.26:beta05:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.26:beta06:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.26:beta06:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.26:beta06:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.26:rc01:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.26:rc01:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.26:rc01:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.27:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.27:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.27:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.28:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.28:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.28:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.29:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.29:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.29:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.2:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.2:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.2:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.2:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.2:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.2:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.2:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.2:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.2:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.2:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.2:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.2:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.2:beta5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.2:beta5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.2:beta5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.2:beta6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.2:beta6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.2:beta6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.2:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.2:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.2:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.31:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.31:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.31:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.32:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.32:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.32:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.33:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.33:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.33:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.3:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.3:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.3:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.3:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.3:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.3:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.3:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.3:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.3:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.3:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.3:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.3:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.3:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.3:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.3:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.3:rc6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.3:rc6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.3:rc6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.4:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.4:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.4:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.4:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.4:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.4:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.4:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.4:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.4:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.4:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.4:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.4:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.5:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.5:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.5:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.5:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.5:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.5:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.5:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.5:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.5:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.5:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.5:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.5:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.5:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.5:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.5:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.5:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.5:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.5:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.6:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.6:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.6:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.6:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.6:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.6:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.6:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.6:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.6:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.6:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.6:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.6:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.6:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.6:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.6:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.6:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.6:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.6:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.6:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.6:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.6:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.6:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.6:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.6:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.6:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.6:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.6:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.7:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.7:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.7:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.7:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.7:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.7:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.8:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.8:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.8:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.8:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.8:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.8:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.8:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.8:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.8:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.8:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.8:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.8:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.8:beta5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.8:beta5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.8:beta5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.8:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.8:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.8:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.8:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.8:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.8:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.8:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.8:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.8:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.8:rc4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.8:rc4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.8:rc4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.8:rc5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.8:rc5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.8:rc5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.9:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.9:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.9:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.9:beta10:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.9:beta10:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.9:beta10:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.9:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.9:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.9:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.9:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.9:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.9:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.9:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.9:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.9:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.9:beta5:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.9:beta5:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.9:beta5:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.9:beta6:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.9:beta6:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.9:beta6:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.9:beta7:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.9:beta7:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.9:beta7:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.9:beta8:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.9:beta8:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.9:beta8:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.9:beta9:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.9:beta9:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.9:beta9:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.9:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.2.9:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.2.9:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta36:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:1.4.0:beta36:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:1.4.0:beta36:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-6218", "reference_id": "CVE-2008-6218", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-6218" }, { "reference_url": "https://security.gentoo.org/glsa/200903-28", "reference_id": "GLSA-200903-28", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200903-28" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2008-6218" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2598-x6rk-j3h1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38797?format=api", "vulnerability_id": "VCID-37q3-my5j-zqbr", "summary": "Multiple vulnerabilities have been found in GNU Automake, allowing\n local arbitrary command execution with the privileges of the user running\n an Automake-based build.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4029.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4029.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4029", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00716", "scoring_system": "epss", "scoring_elements": "0.72321", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00716", "scoring_system": "epss", "scoring_elements": "0.72327", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00716", "scoring_system": "epss", "scoring_elements": "0.72346", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00716", "scoring_system": "epss", "scoring_elements": "0.72322", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00716", "scoring_system": "epss", "scoring_elements": "0.72361", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00716", "scoring_system": "epss", "scoring_elements": "0.72373", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00716", "scoring_system": "epss", "scoring_elements": "0.72396", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00716", "scoring_system": "epss", "scoring_elements": "0.7238", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00716", "scoring_system": "epss", "scoring_elements": "0.72367", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4029" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=542609", "reference_id": "542609", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=542609" }, { "reference_url": "https://security.gentoo.org/glsa/201310-15", "reference_id": "GLSA-201310-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-15" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0321", "reference_id": "RHSA-2010:0321", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0321" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2009-4029" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-37q3-my5j-zqbr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57998?format=api", "vulnerability_id": "VCID-38y7-7n7m-tyeq", "summary": "This GLSA contains notification of vulnerabilities found in several\n Gentoo packages which have been fixed prior to January 1, 2011. The worst\n of these vulnerabilities could lead to local privilege escalation and\n remote code execution. Please see the package list and CVE identifiers\n below for more information.", "references": [ { "reference_url": "http://lftp.yar.ru/news.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lftp.yar.ru/news.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043597.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043597.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=127411372529485&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127411372529485&w=2" }, { "reference_url": "http://marc.info/?l=oss-security&m=127432968701342&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127432968701342&w=2" }, { "reference_url": "http://marc.info/?l=oss-security&m=127611288927500&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127611288927500&w=2" }, { "reference_url": "http://marc.info/?l=oss-security&m=127620248914170&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127620248914170&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2251.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2251.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2251", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02416", "scoring_system": "epss", "scoring_elements": "0.85111", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02416", "scoring_system": "epss", "scoring_elements": "0.85038", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02416", "scoring_system": "epss", "scoring_elements": "0.85051", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02416", "scoring_system": "epss", "scoring_elements": "0.85068", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02416", "scoring_system": "epss", "scoring_elements": "0.85072", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02416", "scoring_system": "epss", "scoring_elements": "0.85094", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02416", "scoring_system": "epss", "scoring_elements": "0.85101", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02416", "scoring_system": "epss", "scoring_elements": "0.85116", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02416", "scoring_system": "epss", "scoring_elements": "0.85114", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2251" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=602836", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=602836" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2251", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2251" }, { "reference_url": "http://secunia.com/advisories/40400", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40400" }, { "reference_url": "http://wiki.rpath.com/Advisories:rPSA-2010-0073", "reference_id": "", "reference_type": "", "scores": [], "url": "http://wiki.rpath.com/Advisories:rPSA-2010-0073" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2085", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2085" }, { "reference_url": "http://www.ocert.org/advisories/ocert-2010-001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ocert.org/advisories/ocert-2010-001.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/514499/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/514499/100/0/threaded" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1654", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1654" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=591580", "reference_id": "591580", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=591580" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.1.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.2.0a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.2.0a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.2.0a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.10a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.10a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.10a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.4.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:2.6.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.4.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.4.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.4.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.4.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.4.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.4.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.5.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:3.7.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:4.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:4.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:4.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:4.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:4.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:4.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:4.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:4.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:4.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:4.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:4.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:4.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:4.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:alexander_v._lukyanov:lftp:4.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:alexander_v._lukyanov:lftp:4.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2251", "reference_id": "CVE-2010-2251", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2251" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0585", "reference_id": "RHSA-2010:0585", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0585" }, { "reference_url": "https://usn.ubuntu.com/984-1/", "reference_id": "USN-984-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/984-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2010-2251" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-38y7-7n7m-tyeq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57762?format=api", "vulnerability_id": "VCID-6kjs-8w35-ayd3", "summary": "This GLSA contains notification of vulnerabilities found in several\n Gentoo packages which have been fixed prior to January 1, 2011. The worst\n of these vulnerabilities could lead to local privilege escalation and\n remote code execution. Please see the package list and CVE identifiers\n below for more information.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4411.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4411.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4411", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.2083", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.2098", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.21038", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20752", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20892", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20907", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20863", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20811", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4411" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4411", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4411" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=499076", "reference_id": "499076", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=499076" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=550346", "reference_id": "550346", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550346" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2009-4411" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6kjs-8w35-ayd3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57546?format=api", "vulnerability_id": "VCID-7dxs-eej1-s3hp", "summary": "This GLSA contains notification of vulnerabilities found in several\n Gentoo packages which have been fixed prior to January 1, 2011. The worst\n of these vulnerabilities could lead to local privilege escalation and\n remote code execution. Please see the package list and CVE identifiers\n below for more information.", "references": [ { "reference_url": "http://marc.info/?l=bugtraq&m=122893066212987&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=122893066212987&w=2" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-6661", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04383", "scoring_system": "epss", "scoring_elements": "0.88988", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04383", "scoring_system": "epss", "scoring_elements": "0.88932", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04383", "scoring_system": "epss", "scoring_elements": "0.88941", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04383", "scoring_system": "epss", "scoring_elements": "0.88957", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04383", "scoring_system": "epss", "scoring_elements": "0.8896", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04383", "scoring_system": "epss", "scoring_elements": "0.88978", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04383", "scoring_system": "epss", "scoring_elements": "0.88983", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04383", "scoring_system": "epss", "scoring_elements": "0.88995", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04383", "scoring_system": "epss", "scoring_elements": "0.88989", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-6661" }, { "reference_url": "http://secunia.com/advisories/33240", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33240" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47219", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47219" }, { "reference_url": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08012.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ivizsecurity.com/security-advisory-iviz-sr-08012.html" }, { "reference_url": "http://www.osvdb.org/50826", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.osvdb.org/50826" }, { "reference_url": "http://www.securityfocus.com/bid/32751", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/32751" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/3459", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/3459" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bitdefender:bitdefender_antivirus:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:bitdefender:bitdefender_antivirus:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bitdefender:bitdefender_antivirus:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-6661", "reference_id": "CVE-2008-6661", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-6661" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2008-6661" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7dxs-eej1-s3hp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57880?format=api", "vulnerability_id": "VCID-94qj-jzse-vuhv", "summary": "This GLSA contains notification of vulnerabilities found in several\n Gentoo packages which have been fixed prior to January 1, 2011. The worst\n of these vulnerabilities could lead to local privilege escalation and\n remote code execution. Please see the package list and CVE identifiers\n below for more information.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041587.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-May/041587.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0829.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0829.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0829", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0504", "scoring_system": "epss", "scoring_elements": "0.89756", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0504", "scoring_system": "epss", "scoring_elements": "0.89715", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0504", "scoring_system": "epss", "scoring_elements": "0.89718", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0504", "scoring_system": "epss", "scoring_elements": "0.89732", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0504", "scoring_system": "epss", "scoring_elements": "0.89734", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0504", "scoring_system": "epss", "scoring_elements": "0.89752", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0504", "scoring_system": "epss", "scoring_elements": "0.89758", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0504", "scoring_system": "epss", "scoring_elements": "0.89765", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0504", "scoring_system": "epss", "scoring_elements": "0.89763", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0829" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0829", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0829" }, { "reference_url": "http://secunia.com/advisories/39914", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/39914" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9718", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9718" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2048", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2048" }, { "reference_url": "http://www.ubuntu.com/usn/USN-936-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-936-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1219", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1219" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=573999", "reference_id": "573999", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=573999" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=580628", "reference_id": "580628", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=580628" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jan-ake_larsson:dvipng:1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:jan-ake_larsson:dvipng:1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jan-ake_larsson:dvipng:1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jan-ake_larsson:dvipng:1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:jan-ake_larsson:dvipng:1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jan-ake_larsson:dvipng:1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tetex:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:tug:tetex:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:tug:tetex:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0829", "reference_id": "CVE-2010-0829", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0829" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/936-1/", "reference_id": "USN-936-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/936-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2010-0829" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-94qj-jzse-vuhv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57916?format=api", "vulnerability_id": "VCID-9mbq-2e8t-pub6", "summary": "This GLSA contains notification of vulnerabilities found in several\n Gentoo packages which have been fixed prior to January 1, 2011. The worst\n of these vulnerabilities could lead to local privilege escalation and\n remote code execution. Please see the package list and CVE identifiers\n below for more information.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051692.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051692.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058580.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058580.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=127378789518426&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127378789518426&w=2" }, { "reference_url": "http://osvdb.org/64690", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/64690" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1000.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1000.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1000", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02369", "scoring_system": "epss", "scoring_elements": "0.84952", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02369", "scoring_system": "epss", "scoring_elements": "0.84875", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02369", "scoring_system": "epss", "scoring_elements": "0.84891", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02369", "scoring_system": "epss", "scoring_elements": "0.84909", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02369", "scoring_system": "epss", "scoring_elements": "0.84913", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02369", "scoring_system": "epss", "scoring_elements": "0.84936", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02369", "scoring_system": "epss", "scoring_elements": "0.84943", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02369", "scoring_system": "epss", "scoring_elements": "0.84959", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02369", "scoring_system": "epss", "scoring_elements": "0.84956", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1000" }, { "reference_url": "http://secunia.com/advisories/39528", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/39528" }, { "reference_url": "http://secunia.com/advisories/39787", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/39787" }, { "reference_url": "http://secunia.com/advisories/42423", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42423" }, { "reference_url": "http://secunia.com/secunia_research/2010-69/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/secunia_research/2010-69/" }, { "reference_url": "http://securitytracker.com/id?1023984", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1023984" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58628" }, { "reference_url": "http://www.kde.org/info/security/advisory-20100513-1.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kde.org/info/security/advisory-20100513-1.txt" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:098", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:098" }, { "reference_url": "http://www.securityfocus.com/archive/1/511281/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/511281/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/511294/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/511294/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/40141", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/40141" }, { "reference_url": "http://www.ubuntu.com/usn/USN-938-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-938-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1142", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1142" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1144", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1144" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3096", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3096" }, { "reference_url": "http://www.vupen.com/english/advisories/2011/1101", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2011/1101" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=591631", "reference_id": "591631", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=591631" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:alpha1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.0.0:alpha1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:alpha1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:alpha2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.0.0:alpha2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:alpha2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.0.0:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.0.0:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.0.0:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.0.0:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.0.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.0.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.0:alpha1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.1.0:alpha1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.0:alpha1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.0:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.1.0:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.0:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.0:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.1.0:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.0:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.0:rc:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.1.0:rc:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.0:rc:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.80:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.1.80:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.80:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.85:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.1.85:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.85:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.96:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.1.96:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.96:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.2:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2:rc:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.2:rc:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2:rc:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.0:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.3.0:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.0:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.0:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.3.0:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.0:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.3.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.3.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.0:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.3.0:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.0:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.0:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.4.0:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.0:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.0:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.4.0:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.0:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.4.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.4.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.0:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.4.0:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.0:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1000", "reference_id": "CVE-2010-1000", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1000" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" }, { "reference_url": "https://usn.ubuntu.com/938-1/", "reference_id": "USN-938-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/938-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2010-1000" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9mbq-2e8t-pub6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57470?format=api", "vulnerability_id": "VCID-afvh-nq3e-5ubm", "summary": "This GLSA contains notification of vulnerabilities found in several\n Gentoo packages which have been fixed prior to January 1, 2011. The worst\n of these vulnerabilities could lead to local privilege escalation and\n remote code execution. Please see the package list and CVE identifiers\n below for more information.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0553.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0553.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0553", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06015", "scoring_system": "epss", "scoring_elements": "0.90664", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06015", "scoring_system": "epss", "scoring_elements": "0.90669", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06015", "scoring_system": "epss", "scoring_elements": "0.90679", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06015", "scoring_system": "epss", "scoring_elements": "0.90688", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06015", "scoring_system": "epss", "scoring_elements": "0.90699", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06015", "scoring_system": "epss", "scoring_elements": "0.90705", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06015", "scoring_system": "epss", "scoring_elements": "0.90714", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06015", "scoring_system": "epss", "scoring_elements": "0.90711", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0553" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0553", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0553" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=431518", "reference_id": "431518", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431518" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485785", "reference_id": "485785", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=485785" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0134", "reference_id": "RHSA-2008:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0135", "reference_id": "RHSA-2008:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0136", "reference_id": "RHSA-2008:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0136" }, { "reference_url": "https://usn.ubuntu.com/664-1/", "reference_id": "USN-664-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/664-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2008-0553" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-afvh-nq3e-5ubm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57788?format=api", "vulnerability_id": "VCID-bjjt-2yp1-efhb", "summary": "This GLSA contains notification of vulnerabilities found in several\n Gentoo packages which have been fixed prior to January 1, 2011. The worst\n of these vulnerabilities could lead to local privilege escalation and\n remote code execution. Please see the package list and CVE identifiers\n below for more information.", "references": [ { "reference_url": "http://bugs.gentoo.org/show_bug.cgi?id=259968", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.gentoo.org/show_bug.cgi?id=259968" }, { "reference_url": "http://mlmmj.org/node/84", "reference_id": "", "reference_type": "", "scores": [], "url": "http://mlmmj.org/node/84" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4896", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81633", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81562", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81574", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81595", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81593", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81621", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81626", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01589", "scoring_system": "epss", "scoring_elements": "0.81646", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4896" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=607256", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=607256" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4896", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4896" }, { "reference_url": "http://secunia.com/advisories/40658", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40658" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2073", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2073" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/06/23/5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/06/23/5" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/06/23/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/06/23/6" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/06/25/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/06/25/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/06/26/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/06/26/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/07/04/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/07/04/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/07/06/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/07/06/1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=588038", "reference_id": "588038", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=588038" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mlmmj:mlmmj:1.2.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mlmmj:mlmmj:1.2.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mlmmj:mlmmj:1.2.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mlmmj:mlmmj:1.2.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mlmmj:mlmmj:1.2.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mlmmj:mlmmj:1.2.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mlmmj:mlmmj:1.2.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mlmmj:mlmmj:1.2.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mlmmj:mlmmj:1.2.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4896", "reference_id": "CVE-2009-4896", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4896" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2009-4896" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bjjt-2yp1-efhb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57937?format=api", "vulnerability_id": "VCID-d8ku-pvcr-nffr", "summary": "This GLSA contains notification of vulnerabilities found in several\n Gentoo packages which have been fixed prior to January 1, 2011. The worst\n of these vulnerabilities could lead to local privilege escalation and\n remote code execution. Please see the package list and CVE identifiers\n below for more information.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051692.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051692.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=127378789518426&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127378789518426&w=2" }, { "reference_url": "http://osvdb.org/64689", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/64689" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1511.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1511.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1511", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05697", "scoring_system": "epss", "scoring_elements": "0.90418", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05697", "scoring_system": "epss", "scoring_elements": "0.90371", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05697", "scoring_system": "epss", "scoring_elements": "0.90374", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05697", "scoring_system": "epss", "scoring_elements": "0.90386", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05697", "scoring_system": "epss", "scoring_elements": "0.9039", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05697", "scoring_system": "epss", "scoring_elements": "0.90404", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05697", "scoring_system": "epss", "scoring_elements": "0.90411", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05697", "scoring_system": "epss", "scoring_elements": "0.90419", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1511" }, { "reference_url": "http://secunia.com/advisories/39528", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/39528" }, { "reference_url": "http://secunia.com/advisories/39787", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/39787" }, { "reference_url": "http://secunia.com/secunia_research/2010-70/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/secunia_research/2010-70/" }, { "reference_url": "http://securitytracker.com/id?1023984", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1023984" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58629", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/58629" }, { "reference_url": "http://www.kde.org/info/security/advisory-20100513-1.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kde.org/info/security/advisory-20100513-1.txt" }, { "reference_url": "http://www.securityfocus.com/archive/1/511279/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/511279/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/511294/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/511294/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/40141", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/40141" }, { "reference_url": "http://www.ubuntu.com/usn/USN-938-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-938-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1142", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1142" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1144", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1144" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3096", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3096" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=591631", "reference_id": "591631", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=591631" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:2.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:2.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:2.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:3.5.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:3.5.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:3.5.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:alpha1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.0.0:alpha1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:alpha1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:alpha2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.0.0:alpha2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:alpha2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.0.0:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.0.0:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.0.0:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:beta4:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.0.0:beta4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:beta4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.0.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.0.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.0:alpha1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.1.0:alpha1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.0:alpha1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.0:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.1.0:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.0:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.0:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.1.0:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.0:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.0:rc:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.1.0:rc:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.0:rc:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.80:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.1.80:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.80:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.85:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.1.85:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.85:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.96:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.1.96:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.96:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.2:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2:rc:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.2:rc:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2:rc:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.0:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.3.0:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.0:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.0:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.3.0:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.0:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.3.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.3.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.0:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.3.0:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.0:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.0:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.4.0:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.0:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.0:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.4.0:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.0:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.0:rc1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.4.0:rc1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.0:rc1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.0:rc2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.4.0:rc2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.0:rc2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.0:rc3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.4.0:rc3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.0:rc3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kget:2.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kget:2.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kget:2.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1511", "reference_id": "CVE-2010-1511", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1511" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" }, { "reference_url": "https://usn.ubuntu.com/938-1/", "reference_id": "USN-938-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/938-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2010-1511" ], "risk_score": 2.9, "exploitability": "0.5", "weighted_severity": "5.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d8ku-pvcr-nffr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/6682?format=api", "vulnerability_id": "VCID-dtf8-3v7n-yydn", "summary": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')\nBuffer overflow in pngpread.c in libpng, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row.", "references": [ { "reference_url": "http://blackberry.com/btsc/KB27244", "reference_id": "", "reference_type": "", "scores": [], "url": "http://blackberry.com/btsc/KB27244" }, { "reference_url": "http://code.google.com/p/chromium/issues/detail?id=45983", "reference_id": "", "reference_type": "", "scores": [], "url": "http://code.google.com/p/chromium/issues/detail?id=45983" }, { "reference_url": "http://googlechromereleases.blogspot.com/2010/07/stable-channel-update.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://googlechromereleases.blogspot.com/2010/07/stable-channel-update.html" }, { "reference_url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=commitdiff%3Bh=188eb6b42602bf7d7ae708a21897923b6a83fe7c#patch18", "reference_id": "", "reference_type": "", "scores": [], "url": "http://libpng.git.sourceforge.net/git/gitweb.cgi?p=libpng/libpng%3Ba=commitdiff%3Bh=188eb6b42602bf7d7ae708a21897923b6a83fe7c#patch18" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00000.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2011//Mar/msg00004.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044283.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044283.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044397.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/044397.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html" }, { "reference_url": "http://lists.vmware.com/pipermail/security-announce/2010/000105.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.vmware.com/pipermail/security-announce/2010/000105.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1205.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1205.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1205", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.1523", "scoring_system": "epss", "scoring_elements": "0.9461", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.1523", "scoring_system": "epss", "scoring_elements": "0.94573", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.1523", "scoring_system": "epss", "scoring_elements": "0.94599", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.1523", "scoring_system": "epss", "scoring_elements": "0.94604", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.1523", "scoring_system": "epss", "scoring_elements": "0.94607", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.1523", "scoring_system": "epss", "scoring_elements": "0.9458", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.1523", "scoring_system": "epss", "scoring_elements": "0.94587", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.1523", "scoring_system": "epss", "scoring_elements": "0.9459", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1205" }, { "reference_url": "https://bugs.webkit.org/show_bug.cgi?id=40798", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugs.webkit.org/show_bug.cgi?id=40798" }, { "reference_url": "https://bugzilla.mozilla.org/show_bug.cgi?id=570451", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=570451" }, { "reference_url": "http://secunia.com/advisories/40302", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40302" }, { "reference_url": "http://secunia.com/advisories/40336", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40336" }, { "reference_url": "http://secunia.com/advisories/40472", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40472" }, { "reference_url": "http://secunia.com/advisories/40547", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40547" }, { "reference_url": "http://secunia.com/advisories/41574", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/41574" }, { "reference_url": "http://secunia.com/advisories/42314", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42314" }, { "reference_url": "http://secunia.com/advisories/42317", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/42317" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59815", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59815" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.613061", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.613061" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11851" }, { "reference_url": "http://support.apple.com/kb/HT4312", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4312" }, { "reference_url": "http://support.apple.com/kb/HT4435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4435" }, { "reference_url": "http://support.apple.com/kb/HT4456", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4456" }, { "reference_url": "http://support.apple.com/kb/HT4457", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4457" }, { "reference_url": "http://support.apple.com/kb/HT4554", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4554" }, { "reference_url": "http://support.apple.com/kb/HT4566", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4566" }, { "reference_url": "http://trac.webkit.org/changeset/61816", "reference_id": "", "reference_type": "", "scores": [], "url": "http://trac.webkit.org/changeset/61816" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2072", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2072" }, { "reference_url": "http://www.libpng.org/pub/png/libpng.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.libpng.org/pub/png/libpng.html" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:133", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:133" }, { "reference_url": "http://www.mozilla.org/security/announce/2010/mfsa2010-41.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mozilla.org/security/announce/2010/mfsa2010-41.html" }, { "reference_url": "http://www.securityfocus.com/bid/41174", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/41174" }, { "reference_url": "http://www.ubuntu.com/usn/USN-960-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-960-1" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2010-0014.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0014.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1612", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1612" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1637", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1637" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1755", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1755" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1837", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1837" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1846", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1846" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1877", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1877" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/2491", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/2491" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3045", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3045" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/3046", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/3046" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=608238", "reference_id": "608238", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=608238" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1205", "reference_id": "CVE-2010-1205", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1205" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/14422.c", "reference_id": "CVE-2010-1205", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/14422.c" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1205", "reference_id": "CVE-2010-1205", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1205" }, { "reference_url": "https://security.gentoo.org/glsa/201010-01", "reference_id": "GLSA-201010-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201010-01" }, { "reference_url": "https://security.gentoo.org/glsa/201301-01", "reference_id": "GLSA-201301-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201301-01" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" }, { "reference_url": "https://security.gentoo.org/glsa/201412-11", "reference_id": "GLSA-201412-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-11" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2010-41", "reference_id": "mfsa2010-41", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2010-41" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0534", "reference_id": "RHSA-2010:0534", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0534" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0545", "reference_id": "RHSA-2010:0545", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0545" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0546", "reference_id": "RHSA-2010:0546", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0546" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0547", "reference_id": "RHSA-2010:0547", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0547" }, { "reference_url": "https://usn.ubuntu.com/930-4/", "reference_id": "USN-930-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/930-4/" }, { "reference_url": "https://usn.ubuntu.com/957-1/", "reference_id": "USN-957-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/957-1/" }, { "reference_url": "https://usn.ubuntu.com/958-1/", "reference_id": "USN-958-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/958-1/" }, { "reference_url": "https://usn.ubuntu.com/960-1/", "reference_id": "USN-960-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/960-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2010-1205" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dtf8-3v7n-yydn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57845?format=api", "vulnerability_id": "VCID-f3g6-ambh-fkbn", "summary": "This GLSA contains notification of vulnerabilities found in several\n Gentoo packages which have been fixed prior to January 1, 2011. The worst\n of these vulnerabilities could lead to local privilege escalation and\n remote code execution. Please see the package list and CVE identifiers\n below for more information.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0732.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0732.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0732", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.1246", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12564", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12605", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12414", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12495", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12547", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12517", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12478", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12438", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0732" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=565527", "reference_id": "565527", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=565527" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2010-0732" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f3g6-ambh-fkbn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46225?format=api", "vulnerability_id": "VCID-f9ym-em5n-87ep", "summary": "Multiple integer overflows in FreeType might allow for the remote execution\n of arbitrary code or a Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0946.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0946.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0946", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.16376", "scoring_system": "epss", "scoring_elements": "0.94827", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.16376", "scoring_system": "epss", "scoring_elements": "0.94836", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.16376", "scoring_system": "epss", "scoring_elements": "0.9484", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.16376", "scoring_system": "epss", "scoring_elements": "0.94842", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.16376", "scoring_system": "epss", "scoring_elements": "0.94851", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.16376", "scoring_system": "epss", "scoring_elements": "0.94856", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.16376", "scoring_system": "epss", "scoring_elements": "0.9486", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.16376", "scoring_system": "epss", "scoring_elements": "0.94863", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.16376", "scoring_system": "epss", "scoring_elements": "0.94864", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0946" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=491384", "reference_id": "491384", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=491384" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524925", "reference_id": "524925", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524925" }, { "reference_url": "https://security.gentoo.org/glsa/200905-05", "reference_id": "GLSA-200905-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200905-05" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0329", "reference_id": "RHSA-2009:0329", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0329" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1061", "reference_id": "RHSA-2009:1061", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1061" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1062", "reference_id": "RHSA-2009:1062", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1062" }, { "reference_url": "https://usn.ubuntu.com/767-1/", "reference_id": "USN-767-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/767-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2009-0946" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f9ym-em5n-87ep" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57980?format=api", "vulnerability_id": "VCID-fwyq-xxf4-6bhd", "summary": "This GLSA contains notification of vulnerabilities found in several\n Gentoo packages which have been fixed prior to January 1, 2011. The worst\n of these vulnerabilities could lead to local privilege escalation and\n remote code execution. Please see the package list and CVE identifiers\n below for more information.", "references": [ { "reference_url": "http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d", "reference_id": "", "reference_type": "", "scores": [], "url": "http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d" }, { "reference_url": "http://kr.github.com/beanstalkd/2010/05/23/1.4.6-release-notes.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://kr.github.com/beanstalkd/2010/05/23/1.4.6-release-notes.html" }, { "reference_url": "http://osvdb.org/65113", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/65113" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2060.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2060.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2060", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01207", "scoring_system": "epss", "scoring_elements": "0.78968", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01207", "scoring_system": "epss", "scoring_elements": "0.78921", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01207", "scoring_system": "epss", "scoring_elements": "0.78927", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01207", "scoring_system": "epss", "scoring_elements": "0.78955", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01207", "scoring_system": "epss", "scoring_elements": "0.78939", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01207", "scoring_system": "epss", "scoring_elements": "0.78963", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01207", "scoring_system": "epss", "scoring_elements": "0.78969", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01207", "scoring_system": "epss", "scoring_elements": "0.78993", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01207", "scoring_system": "epss", "scoring_elements": "0.78978", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2060" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2060", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2060" }, { "reference_url": "http://secunia.com/advisories/40032", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40032" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59107", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59107" }, { "reference_url": "http://www.securityfocus.com/bid/40516", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/40516" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=585162", "reference_id": "585162", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=585162" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=599021", "reference_id": "599021", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=599021" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wildbit:beanstalkd:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:0.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wildbit:beanstalkd:0.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:0.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:0.5:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wildbit:beanstalkd:0.5:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:0.5:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wildbit:beanstalkd:0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wildbit:beanstalkd:0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wildbit:beanstalkd:0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:0.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wildbit:beanstalkd:0.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:0.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wildbit:beanstalkd:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wildbit:beanstalkd:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wildbit:beanstalkd:1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wildbit:beanstalkd:1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wildbit:beanstalkd:1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:1.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wildbit:beanstalkd:1.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:1.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:1.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wildbit:beanstalkd:1.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:1.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:1.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wildbit:beanstalkd:1.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:1.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:1.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:wildbit:beanstalkd:1.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wildbit:beanstalkd:1.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2060", "reference_id": "CVE-2010-2060", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2060" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2010-2060" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fwyq-xxf4-6bhd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41760?format=api", "vulnerability_id": "VCID-jnx7-jk9z-kbfk", "summary": "Two vulnerabilities in pam_krb5 might allow local users to elevate their\n privileges or overwrite arbitrary files.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0361.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0361.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0361", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21441", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21405", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21573", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21632", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21386", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21463", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21524", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21535", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21497", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0361" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0361", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0361" }, { "reference_url": "http://secunia.com/advisories/33914", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33914" }, { "reference_url": "http://secunia.com/advisories/33917", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33917" }, { "reference_url": "http://secunia.com/advisories/33918", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33918" }, { "reference_url": "http://secunia.com/advisories/34260", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34260" }, { "reference_url": "http://secunia.com/advisories/34449", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34449" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200903-39.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200903-39.xml" }, { "reference_url": "http://securitytracker.com/id?1021711", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1021711" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5403", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5403" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5521" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-252767-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-252767-1" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2009-070.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-070.htm" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1721", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1721" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1722", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1722" }, { "reference_url": "http://www.eyrie.org/~eagle/software/pam-krb5/security/2009-02-11.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.eyrie.org/~eagle/software/pam-krb5/security/2009-02-11.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/500892/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/500892/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/33741", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/33741" }, { "reference_url": "http://www.ubuntu.com/usn/USN-719-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-719-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/0410", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/0410" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/0426", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/0426" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/0979", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/0979" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0361", "reference_id": "CVE-2009-0361", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0361" }, { "reference_url": "https://security.gentoo.org/glsa/200903-39", "reference_id": "GLSA-200903-39", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200903-39" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" }, { "reference_url": "https://usn.ubuntu.com/719-1/", "reference_id": "USN-719-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/719-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2009-0361" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jnx7-jk9z-kbfk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58060?format=api", "vulnerability_id": "VCID-jq7m-mt46-bufd", "summary": "This GLSA contains notification of vulnerabilities found in several\n Gentoo packages which have been fixed prior to January 1, 2011. The worst\n of these vulnerabilities could lead to local privilege escalation and\n remote code execution. Please see the package list and CVE identifiers\n below for more information.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2945", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13801", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13852", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13934", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13991", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13793", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13876", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13928", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13885", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13849", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2945" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2945", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2945" }, { "reference_url": "http://secunia.com/advisories/41005", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/41005" }, { "reference_url": "http://svn.berlios.de/viewvc/slim?view=revision&revision=171", "reference_id": "", "reference_type": "", "scores": [], "url": "http://svn.berlios.de/viewvc/slim?view=revision&revision=171" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/08/19/8", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/08/19/8" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2010/08/20/10", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2010/08/20/10" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594414", "reference_id": "594414", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594414" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:simone_rota:slim_simple_login_manager:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:simone_rota:slim_simple_login_manager:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:simone_rota:slim_simple_login_manager:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:simone_rota:slim_simple_login_manager:1.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:simone_rota:slim_simple_login_manager:1.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:simone_rota:slim_simple_login_manager:1.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:simone_rota:slim_simple_login_manager:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:simone_rota:slim_simple_login_manager:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:simone_rota:slim_simple_login_manager:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:simone_rota:slim_simple_login_manager:1.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:simone_rota:slim_simple_login_manager:1.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:simone_rota:slim_simple_login_manager:1.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:simone_rota:slim_simple_login_manager:1.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:simone_rota:slim_simple_login_manager:1.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:simone_rota:slim_simple_login_manager:1.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:simone_rota:slim_simple_login_manager:1.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:simone_rota:slim_simple_login_manager:1.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:simone_rota:slim_simple_login_manager:1.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:simone_rota:slim_simple_login_manager:1.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:simone_rota:slim_simple_login_manager:1.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:simone_rota:slim_simple_login_manager:1.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:simone_rota:slim_simple_login_manager:1.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:simone_rota:slim_simple_login_manager:1.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:simone_rota:slim_simple_login_manager:1.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:simone_rota:slim_simple_login_manager:1.2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:simone_rota:slim_simple_login_manager:1.2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:simone_rota:slim_simple_login_manager:1.2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:simone_rota:slim_simple_login_manager:1.2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:simone_rota:slim_simple_login_manager:1.2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:simone_rota:slim_simple_login_manager:1.2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:simone_rota:slim_simple_login_manager:1.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:simone_rota:slim_simple_login_manager:1.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:simone_rota:slim_simple_login_manager:1.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2945", "reference_id": "CVE-2010-2945", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2945" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2010-2945" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jq7m-mt46-bufd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57957?format=api", "vulnerability_id": "VCID-nbvn-md4g-27cv", "summary": "This GLSA contains notification of vulnerabilities found in several\n Gentoo packages which have been fixed prior to January 1, 2011. The worst\n of these vulnerabilities could lead to local privilege escalation and\n remote code execution. Please see the package list and CVE identifiers\n below for more information.", "references": [ { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043913.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043913.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043948.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043948.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2056.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2056.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2056", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12607", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12635", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12739", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12785", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12593", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12672", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12724", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12692", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.12651", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2056" }, { "reference_url": "http://savannah.gnu.org/forum/forum.php?forum_id=6368", "reference_id": "", "reference_type": "", "scores": [], "url": "http://savannah.gnu.org/forum/forum.php?forum_id=6368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2056", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2056" }, { "reference_url": "http://secunia.com/advisories/40475", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40475" }, { "reference_url": "http://secunia.com/advisories/40532", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40532" }, { "reference_url": "http://www.osvdb.org/66249", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.osvdb.org/66249" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1757", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1757" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=599621", "reference_id": "599621", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=599621" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:gv:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:3.5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:gv:3.5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:3.5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:3.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:gv:3.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:3.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:3.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:gv:3.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:3.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:3.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:gv:3.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:3.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:3.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:gv:3.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:3.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:3.6.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:gv:3.6.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:3.6.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:3.6.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:gv:3.6.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:3.6.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:3.6.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:gv:3.6.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:3.6.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:3.6.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:gv:3.6.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:3.6.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:3.6.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnu:gv:3.6.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gv:3.6.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2056", "reference_id": "CVE-2010-2056", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2056" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2010-2056" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nbvn-md4g-27cv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58003?format=api", "vulnerability_id": "VCID-nes3-sr2e-yueb", "summary": "This GLSA contains notification of vulnerabilities found in several\n Gentoo packages which have been fixed prior to January 1, 2011. The worst\n of these vulnerabilities could lead to local privilege escalation and\n remote code execution. Please see the package list and CVE identifiers\n below for more information.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2529.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2529.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2529", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72211", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.7225", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72262", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72284", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72217", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72237", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72213", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00716", "scoring_system": "epss", "scoring_elements": "0.72376", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00716", "scoring_system": "epss", "scoring_elements": "0.72364", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2529" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:138", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:138" }, { "reference_url": "http://www.securityfocus.com/bid/41911", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/41911" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1890", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1890" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=613819", "reference_id": "613819", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=613819" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:skbuff:iputils:20020927:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:skbuff:iputils:20020927:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:skbuff:iputils:20020927:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:skbuff:iputils:20070202:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:skbuff:iputils:20070202:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:skbuff:iputils:20070202:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:skbuff:iputils:20071127:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:skbuff:iputils:20071127:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:skbuff:iputils:20071127:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:skbuff:iputils:20100214:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:skbuff:iputils:20100214:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:skbuff:iputils:20100214:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandriva:linux:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:mandriva:linux:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mandriva:linux:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2529", "reference_id": "CVE-2010-2529", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2529" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2010-2529" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nes3-sr2e-yueb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34285?format=api", "vulnerability_id": "VCID-pw1x-gvns-bbcx", "summary": "Multiple vulnerabilities have been found in VMware Player, Server,\n and Workstation, allowing remote and local attackers to conduct several\n attacks, including privilege escalation, remote execution of arbitrary\n code, and a Denial of Service.", "references": [ { "reference_url": "ftp://ftp.simplesystems.org/pub/png/src/libpng-1.2.34-ADVISORY.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.simplesystems.org/pub/png/src/libpng-1.2.34-ADVISORY.txt" }, { "reference_url": "http://downloads.sourceforge.net/libpng/libpng-1.2.34-ADVISORY.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://downloads.sourceforge.net/libpng/libpng-1.2.34-ADVISORY.txt" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2009/Aug/msg00001.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00009.html" }, { "reference_url": "http://lists.vmware.com/pipermail/security-announce/2009/000062.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.vmware.com/pipermail/security-announce/2009/000062.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0040.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0040.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0040", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08276", "scoring_system": "epss", "scoring_elements": "0.92242", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08276", "scoring_system": "epss", "scoring_elements": "0.92209", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08276", "scoring_system": "epss", "scoring_elements": "0.92245", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.08276", "scoring_system": "epss", "scoring_elements": "0.92246", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08276", "scoring_system": "epss", "scoring_elements": "0.92216", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08276", "scoring_system": "epss", "scoring_elements": "0.92222", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08276", "scoring_system": "epss", "scoring_elements": "0.92225", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08276", "scoring_system": "epss", "scoring_elements": "0.92235", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08276", "scoring_system": "epss", "scoring_elements": "0.92239", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0040" }, { "reference_url": "http://secunia.com/advisories/33970", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33970" }, { "reference_url": "http://secunia.com/advisories/33976", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33976" }, { "reference_url": "http://secunia.com/advisories/34137", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34137" }, { "reference_url": "http://secunia.com/advisories/34140", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34140" }, { "reference_url": "http://secunia.com/advisories/34143", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34143" }, { "reference_url": "http://secunia.com/advisories/34145", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34145" }, { "reference_url": "http://secunia.com/advisories/34152", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34152" }, { "reference_url": "http://secunia.com/advisories/34210", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34210" }, { "reference_url": "http://secunia.com/advisories/34265", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34265" }, { "reference_url": "http://secunia.com/advisories/34272", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34272" }, { "reference_url": "http://secunia.com/advisories/34320", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34320" }, { "reference_url": "http://secunia.com/advisories/34324", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34324" }, { "reference_url": "http://secunia.com/advisories/34388", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34388" }, { "reference_url": "http://secunia.com/advisories/34462", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34462" }, { "reference_url": "http://secunia.com/advisories/34464", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34464" }, { "reference_url": "http://secunia.com/advisories/35074", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/35074" }, { "reference_url": "http://secunia.com/advisories/35258", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/35258" }, { "reference_url": "http://secunia.com/advisories/35302", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/35302" }, { "reference_url": "http://secunia.com/advisories/35379", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/35379" }, { "reference_url": "http://secunia.com/advisories/35386", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/35386" }, { "reference_url": "http://secunia.com/advisories/36096", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/36096" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200903-28.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200903-28.xml" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201209-25.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201209-25.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48819", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48819" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.405420", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.405420" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.433952", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.433952" }, { "reference_url": "http://sourceforge.net/mailarchive/message.php?msg_name=e56ccc8f0902181726i200f4bf0n20d919473ec409b7%40mail.gmail.com", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/mailarchive/message.php?msg_name=e56ccc8f0902181726i200f4bf0n20d919473ec409b7%40mail.gmail.com" }, { "reference_url": "http://sourceforge.net/project/shownotes.php?group_id=1689&release_id=662441", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/project/shownotes.php?group_id=1689&release_id=662441" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10316", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10316" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6458", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6458" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-259989-1" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020521.1-1" }, { "reference_url": "http://support.apple.com/kb/HT3549", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT3549" }, { "reference_url": "http://support.apple.com/kb/HT3613", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT3613" }, { "reference_url": "http://support.apple.com/kb/HT3639", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT3639" }, { "reference_url": "http://support.apple.com/kb/HT3757", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT3757" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-069.htm" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-208.htm" }, { "reference_url": "http://support.avaya.com/japple/css/japple?temp.documentID=366362&temp.productID=154235&temp.releaseID=361845&temp.bucketID=126655&PAGE=Document", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/japple/css/japple?temp.documentID=366362&temp.productID=154235&temp.releaseID=361845&temp.bucketID=126655&PAGE=Document" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00272.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00272.html" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00412.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00412.html" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00769.html" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00771.html" }, { "reference_url": "http://wiki.rpath.com/Advisories:rPSA-2009-0046", "reference_id": "", "reference_type": "", "scores": [], "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0046" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1750", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1750" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1830", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1830" }, { "reference_url": "http://www.kb.cert.org/vuls/id/649212", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kb.cert.org/vuls/id/649212" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:051", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:051" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:075", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:075" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:083", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:083" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2009-0315.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2009-0315.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2009-0325.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2009-0325.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2009-0333.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2009-0333.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2009-0340.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2009-0340.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/501767/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/501767/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/503912/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/503912/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/505990/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/505990/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/33827", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/33827" }, { "reference_url": "http://www.securityfocus.com/bid/33990", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/33990" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA09-218A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA09-218A.html" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2009-0007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0007.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/0469", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/0469" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/0473", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/0473" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/0632", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/0632" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/1297", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/1451", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/1451" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/1462", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/1462" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/1522", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/1522" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/1560", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/1560" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/1621", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/1621" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/2172", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/2172" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=486355", "reference_id": "486355", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=486355" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:10.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:10.0:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:9.0:-:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise:9.0:-:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:9.0:-:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0040", "reference_id": "CVE-2009-0040", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0040" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0040", "reference_id": "CVE-2009-0040", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0040" }, { "reference_url": "https://security.gentoo.org/glsa/200903-28", "reference_id": "GLSA-200903-28", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200903-28" }, { "reference_url": "https://security.gentoo.org/glsa/201209-25", "reference_id": "GLSA-201209-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-25" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-10", "reference_id": "mfsa2009-10", "reference_type": "", "scores": [ { "value": "critical", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2009-10" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0315", "reference_id": "RHSA-2009:0315", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0315" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0325", "reference_id": "RHSA-2009:0325", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0333", "reference_id": "RHSA-2009:0333", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0333" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0340", "reference_id": "RHSA-2009:0340", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0340" }, { "reference_url": "https://usn.ubuntu.com/728-1/", "reference_id": "USN-728-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/728-1/" }, { "reference_url": "https://usn.ubuntu.com/730-1/", "reference_id": "USN-730-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/730-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2009-0040" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pw1x-gvns-bbcx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57831?format=api", "vulnerability_id": "VCID-pzdg-sasc-byej", "summary": "This GLSA contains notification of vulnerabilities found in several\n Gentoo packages which have been fixed prior to January 1, 2011. The worst\n of these vulnerabilities could lead to local privilege escalation and\n remote code execution. Please see the package list and CVE identifiers\n below for more information.", "references": [ { "reference_url": "ftp://ftp.kde.org/pub/kde/security_patches/kdebase-workspace-4.3.5-CVE-2010-0436.diff", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.kde.org/pub/kde/security_patches/kdebase-workspace-4.3.5-CVE-2010-0436.diff" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039533.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039533.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00002.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2010-0348.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2010-0348.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0436.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0436.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0436", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07148", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.06949", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07054", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.0711", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07085", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07138", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07169", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07167", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00026", "scoring_system": "epss", "scoring_elements": "0.07157", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0436" }, { "reference_url": "http://secunia.com/advisories/39419", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/39419" }, { "reference_url": "http://secunia.com/advisories/39481", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/39481" }, { "reference_url": "http://secunia.com/advisories/39506", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/39506" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57823" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9999", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9999" }, { "reference_url": "http://www.debian.org/security/2010/dsa-2037", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2010/dsa-2037" }, { "reference_url": "http://www.kde.org/info/security/advisory-20100413-1.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.kde.org/info/security/advisory-20100413-1.txt" }, { "reference_url": "http://www.securityfocus.com/bid/39467", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/39467" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/0879", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/0879" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=570613", "reference_id": "570613", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=570613" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:2.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:2.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:2.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:3.5.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:3.5.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:3.5.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:kde:kde_sc:4.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:kde:kde_sc:4.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0436", "reference_id": "CVE-2010-0436", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0436" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0348", "reference_id": "RHSA-2010:0348", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0348" }, { "reference_url": "https://usn.ubuntu.com/932-1/", "reference_id": "USN-932-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/932-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2010-0436" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pzdg-sasc-byej" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51199?format=api", "vulnerability_id": "VCID-qve2-9dec-rfhw", "summary": "Multiple vulnerabilities were found in libpng, which might result in the\n execution of arbitrary code", "references": [ { "reference_url": "http://libpng.sourceforge.net/index.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://libpng.sourceforge.net/index.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html" }, { "reference_url": "http://openwall.com/lists/oss-security/2009/01/09/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://openwall.com/lists/oss-security/2009/01/09/1" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5907.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5907.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5907", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00786", "scoring_system": "epss", "scoring_elements": "0.73803", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00786", "scoring_system": "epss", "scoring_elements": "0.73757", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00786", "scoring_system": "epss", "scoring_elements": "0.73766", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00786", "scoring_system": "epss", "scoring_elements": "0.7379", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00786", "scoring_system": "epss", "scoring_elements": "0.7376", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00786", "scoring_system": "epss", "scoring_elements": "0.73795", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00786", "scoring_system": "epss", "scoring_elements": "0.73808", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00786", "scoring_system": "epss", "scoring_elements": "0.7383", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00786", "scoring_system": "epss", "scoring_elements": "0.73812", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-5907" }, { "reference_url": "http://secunia.com/advisories/34320", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34320" }, { "reference_url": "http://secunia.com/advisories/34388", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34388" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200903-28.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200903-28.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48128", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48128" }, { "reference_url": "http://sourceforge.net/mailarchive/forum.php?thread_name=4B6F0239C13D0245820603C036D180BC79FBAA%40CABOTUKEXCH01.cabot.local&forum_name=png-mng-implement", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/mailarchive/forum.php?thread_name=4B6F0239C13D0245820603C036D180BC79FBAA%40CABOTUKEXCH01.cabot.local&forum_name=png-mng-implement" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1750", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1750" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:051", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:051" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=480321", "reference_id": "480321", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=480321" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5907", "reference_id": "CVE-2008-5907", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5907" }, { "reference_url": "https://security.gentoo.org/glsa/200903-28", "reference_id": "GLSA-200903-28", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200903-28" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" }, { "reference_url": "https://usn.ubuntu.com/730-1/", "reference_id": "USN-730-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/730-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2008-5907" ], "risk_score": 2.2, "exploitability": "0.5", "weighted_severity": "4.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qve2-9dec-rfhw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58036?format=api", "vulnerability_id": "VCID-u57j-v5mv-vkfd", "summary": "This GLSA contains notification of vulnerabilities found in several\n Gentoo packages which have been fixed prior to January 1, 2011. The worst\n of these vulnerabilities could lead to local privilege escalation and\n remote code execution. Please see the package list and CVE identifiers\n below for more information.", "references": [ { "reference_url": "http://github.com/Dieterbe/uzbl/commit/9cc39cb5c9396be013b5dc2ba7e4b3eaa647e975", "reference_id": "", "reference_type": "", "scores": [], "url": "http://github.com/Dieterbe/uzbl/commit/9cc39cb5c9396be013b5dc2ba7e4b3eaa647e975" }, { "reference_url": "http://github.com/pawelz/uzbl/commit/342f292c27973c9df5f631a38bd12f14a9c5cdc2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://github.com/pawelz/uzbl/commit/342f292c27973c9df5f631a38bd12f14a9c5cdc2" }, { "reference_url": "http://marc.info/?l=oss-security&m=128111493509265&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=128111493509265&w=2" }, { "reference_url": "http://marc.info/?l=oss-security&m=128111994317381&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=128111994317381&w=2" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2809", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05768", "scoring_system": "epss", "scoring_elements": "0.90474", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05768", "scoring_system": "epss", "scoring_elements": "0.90434", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05768", "scoring_system": "epss", "scoring_elements": "0.90438", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05768", "scoring_system": "epss", "scoring_elements": "0.9045", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05768", "scoring_system": "epss", "scoring_elements": "0.90455", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05768", "scoring_system": "epss", "scoring_elements": "0.90468", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05768", "scoring_system": "epss", "scoring_elements": "0.90473", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05768", "scoring_system": "epss", "scoring_elements": "0.90481", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2809" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=621964", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621964" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=621965", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621965" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61011", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61011" }, { "reference_url": "http://www.securityfocus.com/bid/42297", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/42297" }, { "reference_url": "http://www.uzbl.org/bugs/index.php?do=details&task_id=240", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.uzbl.org/bugs/index.php?do=details&task_id=240" }, { "reference_url": "http://www.uzbl.org/news.php?id=29", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.uzbl.org/news.php?id=29" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uzbl:uzbl:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:uzbl:uzbl:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uzbl:uzbl:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uzbl:uzbl:2009.12.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:uzbl:uzbl:2009.12.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uzbl:uzbl:2009.12.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uzbl:uzbl:2010.01.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:uzbl:uzbl:2010.01.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:uzbl:uzbl:2010.01.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2809", "reference_id": "CVE-2010-2809", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2809" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/34426.txt", "reference_id": "CVE-2010-2809;OSVDB-67308", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/34426.txt" }, { "reference_url": "https://www.securityfocus.com/bid/42297/info", "reference_id": "CVE-2010-2809;OSVDB-67308", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/42297/info" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2010-2809" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u57j-v5mv-vkfd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57806?format=api", "vulnerability_id": "VCID-vm8g-v83d-mbfm", "summary": "This GLSA contains notification of vulnerabilities found in several\n Gentoo packages which have been fixed prior to January 1, 2011. The worst\n of these vulnerabilities could lead to local privilege escalation and\n remote code execution. Please see the package list and CVE identifiers\n below for more information.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0001.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0001.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0001", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.22601", "scoring_system": "epss", "scoring_elements": "0.95813", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.22601", "scoring_system": "epss", "scoring_elements": "0.95822", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.22601", "scoring_system": "epss", "scoring_elements": "0.9583", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.22601", "scoring_system": "epss", "scoring_elements": "0.95832", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.22601", "scoring_system": "epss", "scoring_elements": "0.95841", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.22601", "scoring_system": "epss", "scoring_elements": "0.95845", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.22601", "scoring_system": "epss", "scoring_elements": "0.95848", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.22601", "scoring_system": "epss", "scoring_elements": "0.95849", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0001" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=554418", "reference_id": "554418", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=554418" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=566002", "reference_id": "566002", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=566002" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0061", "reference_id": "RHSA-2010:0061", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0061" }, { "reference_url": "https://usn.ubuntu.com/889-1/", "reference_id": "USN-889-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/889-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2010-0001" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vm8g-v83d-mbfm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56194?format=api", "vulnerability_id": "VCID-wpkz-zjfa-eqdt", "summary": "Multiple vulnerabilities have been found in AMD64 x86 emulation\n base libraries, the worst of which may allow remote execution of arbitrary\n code.", "references": [ { "reference_url": "http://osvdb.org/36179", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/36179" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2741.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-2741.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-2741", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.15465", "scoring_system": "epss", "scoring_elements": "0.94658", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.15465", "scoring_system": "epss", "scoring_elements": "0.94621", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.15465", "scoring_system": "epss", "scoring_elements": "0.94628", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.15465", "scoring_system": "epss", "scoring_elements": "0.94634", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.15465", "scoring_system": "epss", "scoring_elements": "0.94636", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.15465", "scoring_system": "epss", "scoring_elements": "0.94646", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.15465", "scoring_system": "epss", "scoring_elements": "0.9465", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.15465", "scoring_system": "epss", "scoring_elements": "0.94655", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-2741" }, { "reference_url": "http://scary.beasts.org/security/CESA-2007-001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://scary.beasts.org/security/CESA-2007-001.html" }, { "reference_url": "http://secunia.com/advisories/25294", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25294" }, { "reference_url": "http://secunia.com/advisories/27756", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/27756" }, { "reference_url": "http://secunia.com/advisories/32282", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/32282" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34331", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34331" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:238", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:238" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2007_24_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2007_24_sr.html" }, { "reference_url": "http://www.securityfocus.com/bid/24001", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/24001" }, { "reference_url": "http://www.ubuntu.com/usn/usn-652-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-652-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/1837", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/1837" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:littlecms:lcms:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:1.07:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:littlecms:lcms:1.07:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:1.07:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:1.08:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:littlecms:lcms:1.08:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:1.08:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:1.09:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:littlecms:lcms:1.09:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:1.09:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:1.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:littlecms:lcms:1.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:1.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:1.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:littlecms:lcms:1.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:1.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:1.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:littlecms:lcms:1.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:1.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:1.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:littlecms:lcms:1.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:littlecms:lcms:1.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2741", "reference_id": "CVE-2007-2741", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2741" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" }, { "reference_url": "https://security.gentoo.org/glsa/201412-11", "reference_id": "GLSA-201412-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-11" }, { "reference_url": "https://usn.ubuntu.com/652-1/", "reference_id": "USN-652-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/652-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2007-2741" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wpkz-zjfa-eqdt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41759?format=api", "vulnerability_id": "VCID-xunm-5yje-hqdk", "summary": "Two vulnerabilities in pam_krb5 might allow local users to elevate their\n privileges or overwrite arbitrary files.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0360.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0360.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0360", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00232", "scoring_system": "epss", "scoring_elements": "0.46083", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00232", "scoring_system": "epss", "scoring_elements": "0.4601", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00232", "scoring_system": "epss", "scoring_elements": "0.46061", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.4831", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48335", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48308", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48319", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48261", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0025", "scoring_system": "epss", "scoring_elements": "0.48316", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0360" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0360", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0360" }, { "reference_url": "http://secunia.com/advisories/33914", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33914" }, { "reference_url": "http://secunia.com/advisories/33917", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33917" }, { "reference_url": "http://secunia.com/advisories/34260", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34260" }, { "reference_url": "http://secunia.com/advisories/34449", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34449" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200903-39.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200903-39.xml" }, { "reference_url": "http://securitytracker.com/id?1021711", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1021711" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5669", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5669" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5732" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-252767-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-252767-1" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2009-070.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2009-070.htm" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1721", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1721" }, { "reference_url": "http://www.eyrie.org/~eagle/software/pam-krb5/security/2009-02-11.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.eyrie.org/~eagle/software/pam-krb5/security/2009-02-11.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/500892/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/500892/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/33740", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/33740" }, { "reference_url": "http://www.ubuntu.com/usn/USN-719-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-719-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/0410", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/0410" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/0426", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/0426" }, { "reference_url": "http://www.vupen.com/english/advisories/2009/0979", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2009/0979" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:2.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:2.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:2.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:2.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:2.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:2.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:3.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:3.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:3.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:3.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:3.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:3.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:3.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:eyrie:pam-krb5:3.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:eyrie:pam-krb5:3.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0360", "reference_id": "CVE-2009-0360", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0360" }, { "reference_url": "https://security.gentoo.org/glsa/200903-39", "reference_id": "GLSA-200903-39", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200903-39" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/8303.c", "reference_id": "OSVDB-54343;CVE-2009-0360", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/8303.c" }, { "reference_url": "https://usn.ubuntu.com/719-1/", "reference_id": "USN-719-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/719-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2009-0360" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "5.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xunm-5yje-hqdk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34258?format=api", "vulnerability_id": "VCID-xzye-g5rw-fyh5", "summary": "Multiple vulnerabilities have been found in GraphicsMagick,\n allowing remote attackers to execute arbitrary code or cause a Denial of\n Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3736.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3736.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3736", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26117", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26198", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.2624", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26012", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26078", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.2613", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26139", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31157", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31113", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3736" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=537941", "reference_id": "537941", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=537941" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559797", "reference_id": "559797", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559797" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559801", "reference_id": "559801", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559801" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559806", "reference_id": "559806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559809", "reference_id": "559809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559809" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559811", "reference_id": "559811", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559811" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559814", "reference_id": "559814", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559814" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559815", "reference_id": "559815", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559815" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559816", "reference_id": "559816", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559816" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559819", "reference_id": "559819", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559819" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559822", "reference_id": "559822", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559822" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559824", "reference_id": "559824", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559824" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559825", "reference_id": "559825", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559825" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559826", "reference_id": "559826", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559826" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559829", "reference_id": "559829", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559829" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559831", "reference_id": "559831", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559831" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559832", "reference_id": "559832", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559832" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559833", "reference_id": "559833", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559833" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559834", "reference_id": "559834", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559834" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559835", "reference_id": "559835", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559835" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559836", "reference_id": "559836", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559836" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559837", "reference_id": "559837", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559837" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559840", "reference_id": "559840", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559840" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559844", "reference_id": "559844", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559844" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559845", "reference_id": "559845", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559845" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702436", "reference_id": "702436", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702436" }, { "reference_url": "https://security.gentoo.org/glsa/201311-10", "reference_id": "GLSA-201311-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201311-10" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1646", "reference_id": "RHSA-2009:1646", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1646" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0039", "reference_id": "RHSA-2010:0039", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0039" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2009-3736" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xzye-g5rw-fyh5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50285?format=api", "vulnerability_id": "VCID-ztk4-zbph-akhk", "summary": "The JPEG library is vulnerable to a Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3005.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3005.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3005", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0054", "scoring_system": "epss", "scoring_elements": "0.67548", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0054", "scoring_system": "epss", "scoring_elements": "0.67585", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0054", "scoring_system": "epss", "scoring_elements": "0.67606", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0054", "scoring_system": "epss", "scoring_elements": "0.67636", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0054", "scoring_system": "epss", "scoring_elements": "0.6765", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0054", "scoring_system": "epss", "scoring_elements": "0.67672", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0054", "scoring_system": "epss", "scoring_elements": "0.67658", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0054", "scoring_system": "epss", "scoring_elements": "0.67625", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3005" }, { "reference_url": "https://security.gentoo.org/glsa/200606-11", "reference_id": "GLSA-200606-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200606-11" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2006-3005" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ztk4-zbph-akhk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38684?format=api", "vulnerability_id": "VCID-zv3m-jw5c-6ubn", "summary": "POV-Ray includes a version of libpng that might allow for the execution of\n arbitrary code when reading a specially crafted PNG file", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1382.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1382.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1382", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0633", "scoring_system": "epss", "scoring_elements": "0.90929", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0633", "scoring_system": "epss", "scoring_elements": "0.90935", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0633", "scoring_system": "epss", "scoring_elements": "0.90944", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0633", "scoring_system": "epss", "scoring_elements": "0.90954", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0633", "scoring_system": "epss", "scoring_elements": "0.90965", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0633", "scoring_system": "epss", "scoring_elements": "0.90971", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0633", "scoring_system": "epss", "scoring_elements": "0.9098", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0633", "scoring_system": "epss", "scoring_elements": "0.90981", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1382" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=441839", "reference_id": "441839", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=441839" }, { "reference_url": "https://security.gentoo.org/glsa/200804-15", "reference_id": "GLSA-200804-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200804-15" }, { "reference_url": "https://security.gentoo.org/glsa/200805-10", "reference_id": "GLSA-200805-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200805-10" }, { "reference_url": "https://security.gentoo.org/glsa/200812-15", "reference_id": "GLSA-200812-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200812-15" }, { "reference_url": "https://security.gentoo.org/glsa/201412-08", "reference_id": "GLSA-201412-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0333", "reference_id": "RHSA-2009:0333", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0333" }, { "reference_url": "https://usn.ubuntu.com/730-1/", "reference_id": "USN-730-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/730-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/83552?format=api", "purl": "pkg:ebuild/kde-base/kget@0.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/83553?format=api", "purl": "pkg:ebuild/kde-base/kget@0.6.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@0.6.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/83554?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.0-r4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.0-r4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83555?format=api", "purl": "pkg:ebuild/kde-base/kget@1.2.17.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.2.17.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83556?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83557?format=api", "purl": "pkg:ebuild/kde-base/kget@1.4.14-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.4.14-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83559?format=api", "purl": "pkg:ebuild/kde-base/kget@1.5.4.3-r3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@1.5.4.3-r3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83560?format=api", "purl": "pkg:ebuild/kde-base/kget@2.2.49", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.2.49" }, { "url": "http://public2.vulnerablecode.io/api/packages/83561?format=api", "purl": "pkg:ebuild/kde-base/kget@2.18.7", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@2.18.7" }, { "url": "http://public2.vulnerablecode.io/api/packages/83562?format=api", "purl": "pkg:ebuild/kde-base/kget@4.2.4.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.2.4.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/83563?format=api", "purl": "pkg:ebuild/kde-base/kget@4.3.5-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@4.3.5-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83564?format=api", "purl": "pkg:ebuild/kde-base/kget@5.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@5.1.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/83565?format=api", "purl": "pkg:ebuild/kde-base/kget@6.7.1-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83566?format=api", "purl": "pkg:ebuild/kde-base/kget@8.4.18-r1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@8.4.18-r1" }, { "url": "http://public2.vulnerablecode.io/api/packages/83567?format=api", "purl": "pkg:ebuild/kde-base/kget@804.028-r2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@804.028-r2" } ], "aliases": [ "CVE-2008-1382" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zv3m-jw5c-6ubn" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/kde-base/kget@6.7.1-r1" }