Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/x11-libs/gdk-pixbuf@2.32.1
Typeebuild
Namespacex11-libs
Namegdk-pixbuf
Version2.32.1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.36.9
Latest_non_vulnerable_version2.42.2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-drq5-6jps-skax
vulnerability_id VCID-drq5-6jps-skax
summary
Multiple vulnerabilities have been found in Firefox, Thunderbird,
    Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with
    the worst of which may allow remote execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4491.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4491.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-4491
reference_id
reference_type
scores
0
value 0.04296
scoring_system epss
scoring_elements 0.88879
published_at 2026-04-21T12:55:00Z
1
value 0.04296
scoring_system epss
scoring_elements 0.88815
published_at 2026-04-01T12:55:00Z
2
value 0.04296
scoring_system epss
scoring_elements 0.88884
published_at 2026-04-16T12:55:00Z
3
value 0.04296
scoring_system epss
scoring_elements 0.88882
published_at 2026-04-18T12:55:00Z
4
value 0.04296
scoring_system epss
scoring_elements 0.88823
published_at 2026-04-02T12:55:00Z
5
value 0.04296
scoring_system epss
scoring_elements 0.88839
published_at 2026-04-04T12:55:00Z
6
value 0.04296
scoring_system epss
scoring_elements 0.88841
published_at 2026-04-07T12:55:00Z
7
value 0.04296
scoring_system epss
scoring_elements 0.88859
published_at 2026-04-08T12:55:00Z
8
value 0.04296
scoring_system epss
scoring_elements 0.88864
published_at 2026-04-09T12:55:00Z
9
value 0.04296
scoring_system epss
scoring_elements 0.88876
published_at 2026-04-11T12:55:00Z
10
value 0.04296
scoring_system epss
scoring_elements 0.88871
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-4491
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1252290
reference_id 1252290
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1252290
5
reference_url https://security.gentoo.org/glsa/201512-05
reference_id GLSA-201512-05
reference_type
scores
url https://security.gentoo.org/glsa/201512-05
6
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
7
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-88
reference_id mfsa2015-88
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-88
8
reference_url https://access.redhat.com/errata/RHSA-2015:1586
reference_id RHSA-2015:1586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1586
9
reference_url https://access.redhat.com/errata/RHSA-2015:1682
reference_id RHSA-2015:1682
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1682
10
reference_url https://access.redhat.com/errata/RHSA-2015:1694
reference_id RHSA-2015:1694
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1694
11
reference_url https://usn.ubuntu.com/2702-1/
reference_id USN-2702-1
reference_type
scores
url https://usn.ubuntu.com/2702-1/
12
reference_url https://usn.ubuntu.com/2712-1/
reference_id USN-2712-1
reference_type
scores
url https://usn.ubuntu.com/2712-1/
13
reference_url https://usn.ubuntu.com/2722-1/
reference_id USN-2722-1
reference_type
scores
url https://usn.ubuntu.com/2722-1/
fixed_packages
0
url pkg:ebuild/x11-libs/gdk-pixbuf@2.32.1
purl pkg:ebuild/x11-libs/gdk-pixbuf@2.32.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/gdk-pixbuf@2.32.1
aliases CVE-2015-4491
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-drq5-6jps-skax
1
url VCID-k2ph-py3f-aycu
vulnerability_id VCID-k2ph-py3f-aycu
summary
Multiple buffer overflow vulnerabilities in gdk-pixbuf may allow
    remote attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url http://ftp.gnome.org/pub/gnome/sources/gdk-pixbuf/2.32/gdk-pixbuf-2.32.0.news
reference_id
reference_type
scores
url http://ftp.gnome.org/pub/gnome/sources/gdk-pixbuf/2.32/gdk-pixbuf-2.32.0.news
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7673.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7673.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7673
reference_id
reference_type
scores
0
value 0.02374
scoring_system epss
scoring_elements 0.84987
published_at 2026-04-21T12:55:00Z
1
value 0.02374
scoring_system epss
scoring_elements 0.84889
published_at 2026-04-01T12:55:00Z
2
value 0.02374
scoring_system epss
scoring_elements 0.84905
published_at 2026-04-02T12:55:00Z
3
value 0.02374
scoring_system epss
scoring_elements 0.84923
published_at 2026-04-04T12:55:00Z
4
value 0.02374
scoring_system epss
scoring_elements 0.84927
published_at 2026-04-07T12:55:00Z
5
value 0.02374
scoring_system epss
scoring_elements 0.8495
published_at 2026-04-08T12:55:00Z
6
value 0.02374
scoring_system epss
scoring_elements 0.84957
published_at 2026-04-09T12:55:00Z
7
value 0.02374
scoring_system epss
scoring_elements 0.84973
published_at 2026-04-11T12:55:00Z
8
value 0.02374
scoring_system epss
scoring_elements 0.84972
published_at 2026-04-12T12:55:00Z
9
value 0.02374
scoring_system epss
scoring_elements 0.84967
published_at 2026-04-13T12:55:00Z
10
value 0.02374
scoring_system epss
scoring_elements 0.84988
published_at 2026-04-16T12:55:00Z
11
value 0.02374
scoring_system epss
scoring_elements 0.8499
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7673
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674
7
reference_url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=19f9685dbff7d1f929c61cf99188df917a18811d
reference_id
reference_type
scores
url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=19f9685dbff7d1f929c61cf99188df917a18811d
8
reference_url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=6ddca835100107e6b5841ce9d56074f6d98c387e
reference_id
reference_type
scores
url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=6ddca835100107e6b5841ce9d56074f6d98c387e
9
reference_url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=edf6fb8d856574bc3bb3a703037f56533229267c
reference_id
reference_type
scores
url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=edf6fb8d856574bc3bb3a703037f56533229267c
10
reference_url http://www.debian.org/security/2015/dsa-3378
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3378
11
reference_url http://www.openwall.com/lists/oss-security/2015/10/01/3
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/10/01/3
12
reference_url http://www.openwall.com/lists/oss-security/2015/10/02/9
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/10/02/9
13
reference_url http://www.securityfocus.com/bid/76953
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/76953
14
reference_url http://www.ubuntu.com/usn/USN-2767-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2767-1
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1261836
reference_id 1261836
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1261836
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7673
reference_id CVE-2015-7673
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7673
19
reference_url https://security.gentoo.org/glsa/201512-05
reference_id GLSA-201512-05
reference_type
scores
url https://security.gentoo.org/glsa/201512-05
20
reference_url https://usn.ubuntu.com/2767-1/
reference_id USN-2767-1
reference_type
scores
url https://usn.ubuntu.com/2767-1/
fixed_packages
0
url pkg:ebuild/x11-libs/gdk-pixbuf@2.32.1
purl pkg:ebuild/x11-libs/gdk-pixbuf@2.32.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/gdk-pixbuf@2.32.1
aliases CVE-2015-7673
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k2ph-py3f-aycu
2
url VCID-qwv5-ntpt-mbbp
vulnerability_id VCID-qwv5-ntpt-mbbp
summary
Multiple buffer overflow vulnerabilities in gdk-pixbuf may allow
    remote attackers to execute arbitrary code or cause Denial of Service.
references
0
reference_url http://ftp.gnome.org/pub/gnome/sources/gdk-pixbuf/2.32/gdk-pixbuf-2.32.1.news
reference_id
reference_type
scores
url http://ftp.gnome.org/pub/gnome/sources/gdk-pixbuf/2.32/gdk-pixbuf-2.32.1.news
1
reference_url http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html
2
reference_url http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7674.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7674.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7674
reference_id
reference_type
scores
0
value 0.0155
scoring_system epss
scoring_elements 0.81452
published_at 2026-04-21T12:55:00Z
1
value 0.0155
scoring_system epss
scoring_elements 0.81348
published_at 2026-04-01T12:55:00Z
2
value 0.0155
scoring_system epss
scoring_elements 0.81358
published_at 2026-04-02T12:55:00Z
3
value 0.0155
scoring_system epss
scoring_elements 0.8138
published_at 2026-04-04T12:55:00Z
4
value 0.0155
scoring_system epss
scoring_elements 0.81378
published_at 2026-04-07T12:55:00Z
5
value 0.0155
scoring_system epss
scoring_elements 0.81406
published_at 2026-04-08T12:55:00Z
6
value 0.0155
scoring_system epss
scoring_elements 0.8141
published_at 2026-04-09T12:55:00Z
7
value 0.0155
scoring_system epss
scoring_elements 0.81432
published_at 2026-04-11T12:55:00Z
8
value 0.0155
scoring_system epss
scoring_elements 0.8142
published_at 2026-04-12T12:55:00Z
9
value 0.0155
scoring_system epss
scoring_elements 0.81413
published_at 2026-04-13T12:55:00Z
10
value 0.0155
scoring_system epss
scoring_elements 0.8145
published_at 2026-04-16T12:55:00Z
11
value 0.0155
scoring_system epss
scoring_elements 0.81451
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7674
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674
7
reference_url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=e9a5704edaa9aee9498f1fbf6e1b70fcce2e55aa
reference_id
reference_type
scores
url https://git.gnome.org/browse/gdk-pixbuf/commit/?id=e9a5704edaa9aee9498f1fbf6e1b70fcce2e55aa
8
reference_url http://www.debian.org/security/2015/dsa-3378
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3378
9
reference_url http://www.openwall.com/lists/oss-security/2015/10/01/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/10/01/4
10
reference_url http://www.openwall.com/lists/oss-security/2015/10/01/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/10/01/7
11
reference_url http://www.openwall.com/lists/oss-security/2015/10/02/10
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/10/02/10
12
reference_url http://www.openwall.com/lists/oss-security/2015/10/05/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2015/10/05/7
13
reference_url http://www.securityfocus.com/bid/76955
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/76955
14
reference_url http://www.ubuntu.com/usn/USN-2767-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2767-1
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1268249
reference_id 1268249
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1268249
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7674
reference_id CVE-2015-7674
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2015-7674
22
reference_url https://security.gentoo.org/glsa/201512-05
reference_id GLSA-201512-05
reference_type
scores
url https://security.gentoo.org/glsa/201512-05
23
reference_url https://usn.ubuntu.com/2767-1/
reference_id USN-2767-1
reference_type
scores
url https://usn.ubuntu.com/2767-1/
fixed_packages
0
url pkg:ebuild/x11-libs/gdk-pixbuf@2.32.1
purl pkg:ebuild/x11-libs/gdk-pixbuf@2.32.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/gdk-pixbuf@2.32.1
aliases CVE-2015-7674
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qwv5-ntpt-mbbp
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/x11-libs/gdk-pixbuf@2.32.1