Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/922909?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "type": "deb", "namespace": "debian", "name": "gdk-pixbuf", "version": "2.44.6+dfsg-1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "2.44.6+dfsg-2", "latest_non_vulnerable_version": "2.44.6+dfsg-2", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51460?format=api", "vulnerability_id": "VCID-1jyr-kac3-2ua2", "summary": "The GdkPixbuf library, that is also included in GTK+ 2, contains\n vulnerabilities that could lead to a Denial of Service or the execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2976.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2976.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2976", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01719", "scoring_system": "epss", "scoring_elements": "0.82424", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01719", "scoring_system": "epss", "scoring_elements": "0.8232", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01719", "scoring_system": "epss", "scoring_elements": "0.82334", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01719", "scoring_system": "epss", "scoring_elements": "0.82352", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01719", "scoring_system": "epss", "scoring_elements": "0.82346", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01719", "scoring_system": "epss", "scoring_elements": "0.82373", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01719", "scoring_system": "epss", "scoring_elements": "0.8238", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01719", "scoring_system": "epss", "scoring_elements": "0.82399", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01719", "scoring_system": "epss", "scoring_elements": "0.82396", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01719", "scoring_system": "epss", "scoring_elements": "0.8239", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2976" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2976", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2976" }, { "reference_url": "http://secunia.com/advisories/17522", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17522" }, { "reference_url": "http://secunia.com/advisories/17538", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17538" }, { "reference_url": "http://secunia.com/advisories/17562", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17562" }, { "reference_url": "http://secunia.com/advisories/17592", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17592" }, { "reference_url": "http://secunia.com/advisories/17594", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17594" }, { "reference_url": "http://secunia.com/advisories/17615", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17615" }, { "reference_url": "http://secunia.com/advisories/17657", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17657" }, { "reference_url": "http://secunia.com/advisories/17710", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17710" }, { "reference_url": "http://secunia.com/advisories/17770", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17770" }, { "reference_url": "http://secunia.com/advisories/17791", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17791" }, { "reference_url": "http://securitytracker.com/id?1015216", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1015216" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11370", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11370" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf" }, { "reference_url": "http://www.debian.org/security/2005/dsa-911", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-911" }, { "reference_url": "http://www.debian.org/security/2005/dsa-913", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-913" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:214", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:214" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2005_65_gtk2.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2005_65_gtk2.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-810.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-810.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/428052/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/428052/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/15428", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/15428" }, { "reference_url": "http://www.ubuntu.com/usn/usn-216-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-216-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2433", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2433" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617772", "reference_id": "1617772", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617772" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431", "reference_id": "339431", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:0.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnome:gdkpixbuf:0.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:0.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2976", "reference_id": "CVE-2005-2976", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2976" }, { "reference_url": "https://security.gentoo.org/glsa/200511-14", "reference_id": "GLSA-200511-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200511-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:810", "reference_id": "RHSA-2005:810", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:810" }, { "reference_url": "https://usn.ubuntu.com/216-1/", "reference_id": "USN-216-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/216-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922913?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@0.22.0-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@0.22.0-11%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2005-2976" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1jyr-kac3-2ua2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84909?format=api", "vulnerability_id": "VCID-1ytk-9srj-zfff", "summary": "gdk-pixbuf2: Integer overflow in tiff_image_parse function", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2870.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2870.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2870", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0313", "scoring_system": "epss", "scoring_elements": "0.86799", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0313", "scoring_system": "epss", "scoring_elements": "0.86873", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0313", "scoring_system": "epss", "scoring_elements": "0.8686", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0313", "scoring_system": "epss", "scoring_elements": "0.86855", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0313", "scoring_system": "epss", "scoring_elements": "0.8681", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0313", "scoring_system": "epss", "scoring_elements": "0.86829", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0313", "scoring_system": "epss", "scoring_elements": "0.86823", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0313", "scoring_system": "epss", "scoring_elements": "0.86843", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0313", "scoring_system": "epss", "scoring_elements": "0.86851", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0313", "scoring_system": "epss", "scoring_elements": "0.86864", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2870" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2870", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2870" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1486735", "reference_id": "1486735", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1486735" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873787", "reference_id": "873787", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=873787" }, { "reference_url": "https://usn.ubuntu.com/3418-1/", "reference_id": "USN-3418-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3418-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922923?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.36.10-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.36.10-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-2870" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1ytk-9srj-zfff" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/12131?format=api", "vulnerability_id": "VCID-2a49-ryer-vkhd", "summary": "Out-of-bounds Write\nGNOME gdk-pixbuf is vulnerable to a heap-buffer overflow vulnerability when decoding the lzw compressed stream of image data in GIF files with lzw minimum code size equals `12`", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44648.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-44648.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44648", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.35934", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36125", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36155", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.3599", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.3604", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36062", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36069", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.3603", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36004", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36044", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-44648" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46829", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46829" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136", "reference_id": "", "reference_type": "", "scores": [], "url": "https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/136" }, { "reference_url": "https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014600", "reference_id": "1014600", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014600" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043722", "reference_id": "2043722", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043722" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44648", "reference_id": "CVE-2021-44648", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44648" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2216", "reference_id": "RHSA-2023:2216", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2216" }, { "reference_url": "https://usn.ubuntu.com/5607-1/", "reference_id": "USN-5607-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5607-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922927?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922926?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.9%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.9%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-44648" ], "risk_score": 3.3, "exploitability": "0.5", "weighted_severity": "6.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2a49-ryer-vkhd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62363?format=api", "vulnerability_id": "VCID-37b2-h2nn-ufa8", "summary": "Multiple vulnerabilities have been found in GDK-PixBuf, the worst\n of which could result in the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6313.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6313.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6313", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55782", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55896", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55946", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55948", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55958", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55938", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55895", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00329", "scoring_system": "epss", "scoring_elements": "0.55917", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58327", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00362", "scoring_system": "epss", "scoring_elements": "0.58359", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6313" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6313", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6313" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1427217", "reference_id": "1427217", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1427217" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856445", "reference_id": "856445", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856445" }, { "reference_url": "https://security.gentoo.org/glsa/201709-08", "reference_id": "GLSA-201709-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201709-08" }, { "reference_url": "https://usn.ubuntu.com/3532-1/", "reference_id": "USN-3532-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3532-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922924?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.36.11-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.36.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-6313" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-37b2-h2nn-ufa8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51459?format=api", "vulnerability_id": "VCID-3vjs-geuw-j7h7", "summary": "The GdkPixbuf library, that is also included in GTK+ 2, contains\n vulnerabilities that could lead to a Denial of Service or the execution of\n arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2975.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2975.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2975", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.1189", "scoring_system": "epss", "scoring_elements": "0.9376", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.1189", "scoring_system": "epss", "scoring_elements": "0.937", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.1189", "scoring_system": "epss", "scoring_elements": "0.9371", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.1189", "scoring_system": "epss", "scoring_elements": "0.9372", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.1189", "scoring_system": "epss", "scoring_elements": "0.93723", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.1189", "scoring_system": "epss", "scoring_elements": "0.93732", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.1189", "scoring_system": "epss", "scoring_elements": "0.93734", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.1189", "scoring_system": "epss", "scoring_elements": "0.93738", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2975" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2975", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2975" }, { "reference_url": "http://secunia.com/advisories/17522", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17522" }, { "reference_url": "http://secunia.com/advisories/17538", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17538" }, { "reference_url": "http://secunia.com/advisories/17562", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17562" }, { "reference_url": "http://secunia.com/advisories/17588", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17588" }, { "reference_url": "http://secunia.com/advisories/17591", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17591" }, { "reference_url": "http://secunia.com/advisories/17592", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17592" }, { "reference_url": "http://secunia.com/advisories/17594", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17594" }, { "reference_url": "http://secunia.com/advisories/17615", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17615" }, { "reference_url": "http://secunia.com/advisories/17657", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17657" }, { "reference_url": "http://secunia.com/advisories/17710", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17710" }, { "reference_url": "http://secunia.com/advisories/17770", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17770" }, { "reference_url": "http://secunia.com/advisories/17791", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17791" }, { "reference_url": "http://securitytracker.com/id?1015216", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1015216" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9697", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9697" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf" }, { "reference_url": "http://www.debian.org/security/2005/dsa-911", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-911" }, { "reference_url": "http://www.debian.org/security/2005/dsa-913", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-913" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:214", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:214" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2005_65_gtk2.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2005_65_gtk2.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-810.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-810.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-811.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-811.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/428052/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/428052/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/15429", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/15429" }, { "reference_url": "http://www.ubuntu.com/usn/usn-216-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-216-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2433", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2433" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617771", "reference_id": "1617771", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617771" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431", "reference_id": "339431", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2975", "reference_id": "CVE-2005-2975", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2975" }, { "reference_url": "https://security.gentoo.org/glsa/200511-14", "reference_id": "GLSA-200511-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200511-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:810", "reference_id": "RHSA-2005:810", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:810" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:811", "reference_id": "RHSA-2005:811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:811" }, { "reference_url": "https://usn.ubuntu.com/216-1/", "reference_id": "USN-216-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/216-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922913?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@0.22.0-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@0.22.0-11%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2005-2975" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3vjs-geuw-j7h7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62362?format=api", "vulnerability_id": "VCID-4jf2-xww4-mfau", "summary": "Multiple vulnerabilities have been found in GDK-PixBuf, the worst\n of which could result in the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6312.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6312.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6312", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0031", "scoring_system": "epss", "scoring_elements": "0.54102", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0031", "scoring_system": "epss", "scoring_elements": "0.54119", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0031", "scoring_system": "epss", "scoring_elements": "0.54149", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0031", "scoring_system": "epss", "scoring_elements": "0.54124", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0031", "scoring_system": "epss", "scoring_elements": "0.54176", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0031", "scoring_system": "epss", "scoring_elements": "0.54174", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0031", "scoring_system": "epss", "scoring_elements": "0.54223", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0031", "scoring_system": "epss", "scoring_elements": "0.54205", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55513", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00324", "scoring_system": "epss", "scoring_elements": "0.55477", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6312" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6312", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6312" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1427221", "reference_id": "1427221", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1427221" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856444", "reference_id": "856444", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856444" }, { "reference_url": "https://security.gentoo.org/glsa/201709-08", "reference_id": "GLSA-201709-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201709-08" }, { "reference_url": "https://usn.ubuntu.com/3532-1/", "reference_id": "USN-3532-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3532-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922924?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.36.11-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.36.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-6312" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4jf2-xww4-mfau" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48793?format=api", "vulnerability_id": "VCID-4zm2-zv71-jfat", "summary": "A vulnerability in GDK-PixBuf library could lead to a Denial of\n Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29385.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29385.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29385", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70315", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70419", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70406", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70391", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70377", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70328", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70345", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70322", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70367", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00634", "scoring_system": "epss", "scoring_elements": "0.70382", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-29385" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29385", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29385" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927237", "reference_id": "1927237", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927237" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977166", "reference_id": "977166", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=977166" }, { "reference_url": "https://security.archlinux.org/ASA-202012-19", "reference_id": "ASA-202012-19", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-19" }, { "reference_url": "https://security.archlinux.org/ASA-202012-20", "reference_id": "ASA-202012-20", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-20" }, { "reference_url": "https://security.archlinux.org/AVG-1328", "reference_id": "AVG-1328", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1328" }, { "reference_url": "https://security.archlinux.org/AVG-1329", "reference_id": "AVG-1329", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1329" }, { "reference_url": "https://security.gentoo.org/glsa/202012-15", "reference_id": "GLSA-202012-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202012-15" }, { "reference_url": "https://usn.ubuntu.com/4663-1/", "reference_id": "USN-4663-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4663-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922925?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2020-29385" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4zm2-zv71-jfat" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62364?format=api", "vulnerability_id": "VCID-7cp9-37h3-tkhq", "summary": "Multiple vulnerabilities have been found in GDK-PixBuf, the worst\n of which could result in the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6314.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6314.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6314", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.6189", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61964", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62014", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62031", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62052", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.62041", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61963", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00421", "scoring_system": "epss", "scoring_elements": "0.61995", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63189", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0044", "scoring_system": "epss", "scoring_elements": "0.63225", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6314" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6314", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6314" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1427218", "reference_id": "1427218", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1427218" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856448", "reference_id": "856448", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=856448" }, { "reference_url": "https://security.gentoo.org/glsa/201709-08", "reference_id": "GLSA-201709-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201709-08" }, { "reference_url": "https://usn.ubuntu.com/3532-1/", "reference_id": "USN-3532-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3532-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922924?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.36.11-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.36.11-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-6314" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7cp9-37h3-tkhq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84069?format=api", "vulnerability_id": "VCID-7hwy-9gdx-rya8", "summary": "gdk-pixbuf: heap-based overflow caused by invalid palette size", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12447.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12447.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12447", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54423", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54546", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54548", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.5453", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54509", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54498", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54521", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.5449", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54542", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00314", "scoring_system": "epss", "scoring_elements": "0.54536", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12447" }, { "reference_url": "https://bugzilla.gnome.org/show_bug.cgi?id=785979", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.gnome.org/show_bug.cgi?id=785979" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12447", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12447" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/hackerlib/hackerlib-vul/tree/master/gnome", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/hackerlib/hackerlib-vul/tree/master/gnome" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686828", "reference_id": "1686828", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686828" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:2.32.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnome:gdk-pixbuf:2.32.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:2.32.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:nautilus:3.14.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnome:nautilus:3.14.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:nautilus:3.14.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12447", "reference_id": "CVE-2017-12447", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12447" }, { "reference_url": "https://usn.ubuntu.com/3912-1/", "reference_id": "USN-3912-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3912-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922920?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.34.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.34.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-12447" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7hwy-9gdx-rya8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90072?format=api", "vulnerability_id": "VCID-d5bq-uv1h-rqa8", "summary": "gdk-pixbuf: GIF loader buffer overflow when initializing decompression tables", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2897.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2897.json" }, { "reference_url": "https://access.redhat.com/security/cve/cve-2011-2897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/security/cve/cve-2011-2897" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2897", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76859", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76816", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76759", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76763", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76791", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76772", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76803", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76814", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76842", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00985", "scoring_system": "epss", "scoring_elements": "0.76822", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2897" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2897" }, { "reference_url": "https://security-tracker.debian.org/tracker/CVE-2011-2897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security-tracker.debian.org/tracker/CVE-2011-2897" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=727081", "reference_id": "727081", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=727081" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2897", "reference_id": "CVE-2011-2897", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2897" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922915?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-2897" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d5bq-uv1h-rqa8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51706?format=api", "vulnerability_id": "VCID-drq5-6jps-skax", "summary": "Multiple vulnerabilities have been found in Firefox, Thunderbird,\n Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with\n the worst of which may allow remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4491.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-4491.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4491", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04296", "scoring_system": "epss", "scoring_elements": "0.88884", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04296", "scoring_system": "epss", "scoring_elements": "0.88815", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04296", "scoring_system": "epss", "scoring_elements": "0.88876", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04296", "scoring_system": "epss", "scoring_elements": "0.88871", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04296", "scoring_system": "epss", "scoring_elements": "0.88823", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04296", "scoring_system": "epss", "scoring_elements": "0.88839", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04296", "scoring_system": "epss", "scoring_elements": "0.88841", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04296", "scoring_system": "epss", "scoring_elements": "0.88859", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04296", "scoring_system": "epss", "scoring_elements": "0.88864", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-4491" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252290", "reference_id": "1252290", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1252290" }, { "reference_url": "https://security.gentoo.org/glsa/201512-05", "reference_id": "GLSA-201512-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-05" }, { "reference_url": "https://security.gentoo.org/glsa/201605-06", "reference_id": "GLSA-201605-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201605-06" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-88", "reference_id": "mfsa2015-88", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2015-88" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1586", "reference_id": "RHSA-2015:1586", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1586" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1682", "reference_id": "RHSA-2015:1682", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1682" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1694", "reference_id": "RHSA-2015:1694", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1694" }, { "reference_url": "https://usn.ubuntu.com/2702-1/", "reference_id": "USN-2702-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2702-1/" }, { "reference_url": "https://usn.ubuntu.com/2712-1/", "reference_id": "USN-2712-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2712-1/" }, { "reference_url": "https://usn.ubuntu.com/2722-1/", "reference_id": "USN-2722-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2722-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922917?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.31.7-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.31.7-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2015-4491" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-drq5-6jps-skax" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51461?format=api", "vulnerability_id": "VCID-ecuv-xp49-5yeh", "summary": "The GdkPixbuf library, that is also included in GTK+ 2, contains\n vulnerabilities that could lead to a Denial of Service or the execution of\n arbitrary code.", "references": [ { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.8/SCOSA-2006.8.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.8/SCOSA-2006.8.txt" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3186.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3186.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3186", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02224", "scoring_system": "epss", "scoring_elements": "0.84533", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02224", "scoring_system": "epss", "scoring_elements": "0.84439", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02224", "scoring_system": "epss", "scoring_elements": "0.84454", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02224", "scoring_system": "epss", "scoring_elements": "0.84474", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02224", "scoring_system": "epss", "scoring_elements": "0.84476", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02224", "scoring_system": "epss", "scoring_elements": "0.84497", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02224", "scoring_system": "epss", "scoring_elements": "0.84503", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02224", "scoring_system": "epss", "scoring_elements": "0.84521", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02224", "scoring_system": "epss", "scoring_elements": "0.84516", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02224", "scoring_system": "epss", "scoring_elements": "0.84512", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3186" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3186", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3186" }, { "reference_url": "http://secunia.com/advisories/17522", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17522" }, { "reference_url": "http://secunia.com/advisories/17538", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17538" }, { "reference_url": "http://secunia.com/advisories/17562", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17562" }, { "reference_url": "http://secunia.com/advisories/17588", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17588" }, { "reference_url": "http://secunia.com/advisories/17591", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17591" }, { "reference_url": "http://secunia.com/advisories/17592", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17592" }, { "reference_url": "http://secunia.com/advisories/17594", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17594" }, { "reference_url": "http://secunia.com/advisories/17615", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17615" }, { "reference_url": "http://secunia.com/advisories/17657", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17657" }, { "reference_url": "http://secunia.com/advisories/17710", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17710" }, { "reference_url": "http://secunia.com/advisories/17770", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17770" }, { "reference_url": "http://secunia.com/advisories/17791", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17791" }, { "reference_url": "http://secunia.com/advisories/18509", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18509" }, { "reference_url": "http://securityreason.com/securityalert/188", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securityreason.com/securityalert/188" }, { "reference_url": "http://securitytracker.com/id?1015216", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1015216" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9503", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9503" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-229.pdf" }, { "reference_url": "http://www.debian.org/security/2005/dsa-911", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-911" }, { "reference_url": "http://www.debian.org/security/2005/dsa-913", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-913" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200511-14.xml" }, { "reference_url": "http://www.idefense.com/application/poi/display?id=339&type=vulnerabilities", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.idefense.com/application/poi/display?id=339&type=vulnerabilities" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:214", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:214" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2005_65_gtk2.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2005_65_gtk2.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-810.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-810.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-811.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-811.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/428052/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/428052/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/15435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/15435" }, { "reference_url": "http://www.ubuntu.com/usn/usn-216-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-216-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2433", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2433" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617795", "reference_id": "1617795", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617795" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431", "reference_id": "339431", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=339431" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdkpixbuf:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gtk:gtk\\+:2.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gtk:gtk\\+:2.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gtk:gtk\\+:2.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3186", "reference_id": "CVE-2005-3186", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3186" }, { "reference_url": "https://security.gentoo.org/glsa/200511-14", "reference_id": "GLSA-200511-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200511-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:810", "reference_id": "RHSA-2005:810", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:810" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:811", "reference_id": "RHSA-2005:811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:811" }, { "reference_url": "https://usn.ubuntu.com/216-1/", "reference_id": "USN-216-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/216-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922913?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@0.22.0-11?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@0.22.0-11%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2005-3186" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ecuv-xp49-5yeh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89414?format=api", "vulnerability_id": "VCID-epbu-y9uy-83bs", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0782.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0782.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0782", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.30045", "scoring_system": "epss", "scoring_elements": "0.96626", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.30045", "scoring_system": "epss", "scoring_elements": "0.96635", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.30045", "scoring_system": "epss", "scoring_elements": "0.9664", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.30045", "scoring_system": "epss", "scoring_elements": "0.96644", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.30045", "scoring_system": "epss", "scoring_elements": "0.96652", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.30045", "scoring_system": "epss", "scoring_elements": "0.96654", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.30045", "scoring_system": "epss", "scoring_elements": "0.96656", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.30045", "scoring_system": "epss", "scoring_elements": "0.96659", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.30045", "scoring_system": "epss", "scoring_elements": "0.96666", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0782" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0782", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0782" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617283", "reference_id": "1617283", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617283" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2004:447", "reference_id": "RHSA-2004:447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2004:447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2004:466", "reference_id": "RHSA-2004:466", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2004:466" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922911?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@0.22.0-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@0.22.0-7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2004-0782" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-epbu-y9uy-83bs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85008?format=api", "vulnerability_id": "VCID-hfkx-cat3-puf8", "summary": "gdk-pixbuf: Out-of-bounds write in OneLine32() function", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6352.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6352.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6352", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01556", "scoring_system": "epss", "scoring_elements": "0.81387", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01556", "scoring_system": "epss", "scoring_elements": "0.8149", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01556", "scoring_system": "epss", "scoring_elements": "0.81473", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01556", "scoring_system": "epss", "scoring_elements": "0.8146", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01556", "scoring_system": "epss", "scoring_elements": "0.81453", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01556", "scoring_system": "epss", "scoring_elements": "0.81396", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01556", "scoring_system": "epss", "scoring_elements": "0.81419", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01556", "scoring_system": "epss", "scoring_elements": "0.81418", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01556", "scoring_system": "epss", "scoring_elements": "0.81446", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01556", "scoring_system": "epss", "scoring_elements": "0.81451", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6352" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6352", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6352" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349751", "reference_id": "1349751", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1349751" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832496", "reference_id": "832496", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832496" }, { "reference_url": "https://security.archlinux.org/ASA-201610-9", "reference_id": "ASA-201610-9", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201610-9" }, { "reference_url": "https://security.archlinux.org/ASA-201611-12", "reference_id": "ASA-201611-12", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201611-12" }, { "reference_url": "https://security.archlinux.org/AVG-1", "reference_id": "AVG-1", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1" }, { "reference_url": "https://security.archlinux.org/AVG-2", "reference_id": "AVG-2", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2" }, { "reference_url": "https://usn.ubuntu.com/3085-1/", "reference_id": "USN-3085-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3085-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922921?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.35.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.35.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2016-6352" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hfkx-cat3-puf8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79184?format=api", "vulnerability_id": "VCID-juwv-p63q-8ffy", "summary": "gdk-pixbuf: heap-based buffer overflow when compositing or clearing frames in GIF files", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46829.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46829.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46829", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62096", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62255", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.6223", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62209", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62157", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62187", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62155", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62205", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62223", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00425", "scoring_system": "epss", "scoring_elements": "0.62241", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-46829" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44648" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46829", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46829" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114940", "reference_id": "2114940", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114940" }, { "reference_url": "https://security.archlinux.org/AVG-2786", "reference_id": "AVG-2786", "reference_type": "", "scores": [ { "value": "Unknown", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2786" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2216", "reference_id": "RHSA-2023:2216", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2216" }, { "reference_url": "https://usn.ubuntu.com/5554-1/", "reference_id": "USN-5554-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5554-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922927?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922928?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.8%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.8%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-46829" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-juwv-p63q-8ffy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89159?format=api", "vulnerability_id": "VCID-juz2-dgbr-4bd7", "summary": "security flaw", "references": [ { "reference_url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000958", "reference_id": "", "reference_type": "", "scores": [], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000958" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0891.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0891.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-0891", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02026", "scoring_system": "epss", "scoring_elements": "0.83815", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02026", "scoring_system": "epss", "scoring_elements": "0.83786", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02026", "scoring_system": "epss", "scoring_elements": "0.83782", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02026", "scoring_system": "epss", "scoring_elements": "0.83716", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02026", "scoring_system": "epss", "scoring_elements": "0.83729", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02026", "scoring_system": "epss", "scoring_elements": "0.83743", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02026", "scoring_system": "epss", "scoring_elements": "0.83746", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02026", "scoring_system": "epss", "scoring_elements": "0.8377", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02026", "scoring_system": "epss", "scoring_elements": "0.83776", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02026", "scoring_system": "epss", "scoring_elements": "0.83792", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-0891" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0891", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0891" }, { "reference_url": "http://secunia.com/advisories/17657", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17657" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9710", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9710" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:214", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:214" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-343.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-343.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-344.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-344.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/419771/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/419771/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/12950", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/12950" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617587", "reference_id": "1617587", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617587" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gtk:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0891", "reference_id": "CVE-2005-0891", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0891" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:343", "reference_id": "RHSA-2005:343", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:343" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:344", "reference_id": "RHSA-2005:344", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:344" }, { "reference_url": "https://usn.ubuntu.com/108-1/", "reference_id": "USN-108-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/108-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922912?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@0.22.0-7.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@0.22.0-7.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2005-0891" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-juz2-dgbr-4bd7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68799?format=api", "vulnerability_id": "VCID-jzz2-x2gk-8kf1", "summary": "gdk‑pixbuf: Heap‑buffer‑overflow in gdk‑pixbuf", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-7345.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-7345.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-7345", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00375", "scoring_system": "epss", "scoring_elements": "0.59087", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61801", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61753", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61768", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61789", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61777", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61758", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61733", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00417", "scoring_system": "epss", "scoring_elements": "0.61704", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-7345" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7345", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7345" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109262", "reference_id": "1109262", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1109262" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2377063", "reference_id": "2377063", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:53:14Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2377063" }, { "reference_url": "https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/249", "reference_id": "249", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:53:14Z/" } ], "url": "https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/249" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb", "reference_id": "cpe:/a:redhat:enterprise_linux:8::crb", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream", "reference_id": "cpe:/a:redhat:rhel_aus:8.2::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream", "reference_id": "cpe:/a:redhat:rhel_aus:8.4::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream", "reference_id": "cpe:/a:redhat:rhel_aus:8.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:8.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:8.8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:9.0::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:9.2::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:9.4::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream", "reference_id": "cpe:/a:redhat:rhel_eus_long_life:8.4::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream", "reference_id": "cpe:/a:redhat:rhel_tus:8.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream", "reference_id": "cpe:/a:redhat:rhel_tus:8.8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0", "reference_id": "cpe:/o:redhat:enterprise_linux:10.0", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos", "reference_id": "cpe:/o:redhat:enterprise_linux:8::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos", "reference_id": "cpe:/o:redhat:rhel_aus:8.2::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos", "reference_id": "cpe:/o:redhat:rhel_aus:8.4::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos", "reference_id": "cpe:/o:redhat:rhel_aus:8.6::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos", "reference_id": "cpe:/o:redhat:rhel_e4s:8.6::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos", "reference_id": "cpe:/o:redhat:rhel_e4s:8.8::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7", "reference_id": "cpe:/o:redhat:rhel_els:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos", "reference_id": "cpe:/o:redhat:rhel_eus_long_life:8.4::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos", "reference_id": "cpe:/o:redhat:rhel_tus:8.6::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos", "reference_id": "cpe:/o:redhat:rhel_tus:8.8::baseos", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2025-7345", "reference_id": "CVE-2025-7345", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:53:14Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2025-7345" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:12841", "reference_id": "RHSA-2025:12841", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:53:14Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:12841" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:12862", "reference_id": "RHSA-2025:12862", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:53:14Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:12862" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13315", "reference_id": "RHSA-2025:13315", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:53:14Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:13315" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14574", "reference_id": "RHSA-2025:14574", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:53:14Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:14574" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14575", "reference_id": "RHSA-2025:14575", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:53:14Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:14575" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14576", "reference_id": "RHSA-2025:14576", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:53:14Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:14576" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14585", "reference_id": "RHSA-2025:14585", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:53:14Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:14585" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14618", "reference_id": "RHSA-2025:14618", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:53:14Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:14618" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14646", "reference_id": "RHSA-2025:14646", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:53:14Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:14646" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14647", "reference_id": "RHSA-2025:14647", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:53:14Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:14647" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14683", "reference_id": "RHSA-2025:14683", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-08T13:53:14Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:14683" }, { "reference_url": "https://usn.ubuntu.com/7662-1/", "reference_id": "USN-7662-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7662-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922934?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-7345" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jzz2-x2gk-8kf1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60181?format=api", "vulnerability_id": "VCID-k2ph-py3f-aycu", "summary": "Multiple buffer overflow vulnerabilities in gdk-pixbuf may allow\n remote attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "http://ftp.gnome.org/pub/gnome/sources/gdk-pixbuf/2.32/gdk-pixbuf-2.32.0.news", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ftp.gnome.org/pub/gnome/sources/gdk-pixbuf/2.32/gdk-pixbuf-2.32.0.news" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7673.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7673.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7673", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02374", "scoring_system": "epss", "scoring_elements": "0.84988", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02374", "scoring_system": "epss", "scoring_elements": "0.84889", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02374", "scoring_system": "epss", "scoring_elements": "0.84905", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02374", "scoring_system": "epss", "scoring_elements": "0.84923", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02374", "scoring_system": "epss", "scoring_elements": "0.84927", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02374", "scoring_system": "epss", "scoring_elements": "0.8495", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02374", "scoring_system": "epss", "scoring_elements": "0.84957", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02374", "scoring_system": "epss", "scoring_elements": "0.84973", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02374", "scoring_system": "epss", "scoring_elements": "0.84972", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02374", "scoring_system": "epss", "scoring_elements": "0.84967", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674" }, { "reference_url": "https://git.gnome.org/browse/gdk-pixbuf/commit/?id=19f9685dbff7d1f929c61cf99188df917a18811d", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.gnome.org/browse/gdk-pixbuf/commit/?id=19f9685dbff7d1f929c61cf99188df917a18811d" }, { "reference_url": "https://git.gnome.org/browse/gdk-pixbuf/commit/?id=6ddca835100107e6b5841ce9d56074f6d98c387e", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.gnome.org/browse/gdk-pixbuf/commit/?id=6ddca835100107e6b5841ce9d56074f6d98c387e" }, { "reference_url": "https://git.gnome.org/browse/gdk-pixbuf/commit/?id=edf6fb8d856574bc3bb3a703037f56533229267c", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.gnome.org/browse/gdk-pixbuf/commit/?id=edf6fb8d856574bc3bb3a703037f56533229267c" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3378", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3378" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/10/01/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/10/01/3" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/10/02/9", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/10/02/9" }, { "reference_url": "http://www.securityfocus.com/bid/76953", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/76953" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2767-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2767-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1261836", "reference_id": "1261836", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1261836" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7673", "reference_id": "CVE-2015-7673", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7673" }, { "reference_url": "https://security.gentoo.org/glsa/201512-05", "reference_id": "GLSA-201512-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-05" }, { "reference_url": "https://usn.ubuntu.com/2767-1/", "reference_id": "USN-2767-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2767-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922918?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.32.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.32.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2015-7673" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k2ph-py3f-aycu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81050?format=api", "vulnerability_id": "VCID-ku5p-8cre-xkee", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8875.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8875.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8875", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00598", "scoring_system": "epss", "scoring_elements": "0.69433", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00598", "scoring_system": "epss", "scoring_elements": "0.69407", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00598", "scoring_system": "epss", "scoring_elements": "0.69394", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00598", "scoring_system": "epss", "scoring_elements": "0.69325", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00598", "scoring_system": "epss", "scoring_elements": "0.69337", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00598", "scoring_system": "epss", "scoring_elements": "0.69354", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00598", "scoring_system": "epss", "scoring_elements": "0.69334", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00598", "scoring_system": "epss", "scoring_elements": "0.69384", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00598", "scoring_system": "epss", "scoring_elements": "0.694", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00598", "scoring_system": "epss", "scoring_elements": "0.69423", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8875" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8875", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8875" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.gnome.org/browse/gdk-pixbuf/commit/?id=dbfe8f70471864818bf458a39c8a99640895bd22", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.gnome.org/browse/gdk-pixbuf/commit/?id=dbfe8f70471864818bf458a39c8a99640895bd22" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3589", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3589" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/05/12/3", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/05/12/3" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/05/16/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/05/16/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2016/05/17/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2016/05/17/7" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3085-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3085-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337063", "reference_id": "1337063", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1337063" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8875", "reference_id": "CVE-2015-8875", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8875" }, { "reference_url": "https://usn.ubuntu.com/3085-1/", "reference_id": "USN-3085-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3085-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922920?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.34.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.34.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2015-8875" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ku5p-8cre-xkee" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/20640?format=api", "vulnerability_id": "VCID-pf79-yf2z-syem", "summary": "Out-of-bounds Write\nIn GNOME GdkPixbuf (aka gdk-pixbuf) through 2.42.10, the ANI (Windows animated cursor) decoder encounters heap memory corruption (in ani_load_chunk in io-ani.c) when parsing chunks in a crafted .ani file. A crafted file could allow an attacker to overwrite heap metadata, leading to a denial of service or code execution attack. This occurs in gdk_pixbuf_set_option() in gdk-pixbuf.c.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48622.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48622.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48622", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23131", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23031", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23111", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23075", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23018", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23175", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.22965", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23039", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00077", "scoring_system": "epss", "scoring_elements": "0.23092", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-48622" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48622", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48622" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/202", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-26T19:23:51Z/" } ], "url": "https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/202" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071265", "reference_id": "1071265", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071265" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260545", "reference_id": "2260545", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260545" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48622", "reference_id": "CVE-2022-48622", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3341", "reference_id": "RHSA-2024:3341", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3341" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3834", "reference_id": "RHSA-2024:3834", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3834" }, { "reference_url": "https://usn.ubuntu.com/6806-1/", "reference_id": "USN-6806-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6806-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922929?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922930?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2022-48622" ], "risk_score": 3.3, "exploitability": "0.5", "weighted_severity": "6.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pf79-yf2z-syem" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62361?format=api", "vulnerability_id": "VCID-q8wp-65d8-yqcr", "summary": "Multiple vulnerabilities have been found in GDK-PixBuf, the worst\n of which could result in the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6311.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6311.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6311", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01913", "scoring_system": "epss", "scoring_elements": "0.83233", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01913", "scoring_system": "epss", "scoring_elements": "0.83249", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01913", "scoring_system": "epss", "scoring_elements": "0.83264", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01913", "scoring_system": "epss", "scoring_elements": "0.83263", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01913", "scoring_system": "epss", "scoring_elements": "0.83287", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01913", "scoring_system": "epss", "scoring_elements": "0.83296", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01913", "scoring_system": "epss", "scoring_elements": "0.83312", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01913", "scoring_system": "epss", "scoring_elements": "0.83306", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01913", "scoring_system": "epss", "scoring_elements": "0.83301", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01913", "scoring_system": "epss", "scoring_elements": "0.83337", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6311" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6311", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6311" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1427222", "reference_id": "1427222", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1427222" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858491", "reference_id": "858491", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858491" }, { "reference_url": "https://security.gentoo.org/glsa/201709-08", "reference_id": "GLSA-201709-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201709-08" }, { "reference_url": "https://usn.ubuntu.com/3418-1/", "reference_id": "USN-3418-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3418-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922923?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.36.10-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.36.10-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-6311" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q8wp-65d8-yqcr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60182?format=api", "vulnerability_id": "VCID-qwv5-ntpt-mbbp", "summary": "Multiple buffer overflow vulnerabilities in gdk-pixbuf may allow\n remote attackers to execute arbitrary code or cause Denial of Service.", "references": [ { "reference_url": "http://ftp.gnome.org/pub/gnome/sources/gdk-pixbuf/2.32/gdk-pixbuf-2.32.1.news", "reference_id": "", "reference_type": "", "scores": [], "url": "http://ftp.gnome.org/pub/gnome/sources/gdk-pixbuf/2.32/gdk-pixbuf-2.32.1.news" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7674.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7674.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7674", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.8145", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81348", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81358", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.8138", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81378", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81406", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.8141", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81432", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.8142", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0155", "scoring_system": "epss", "scoring_elements": "0.81413", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7674" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674" }, { "reference_url": "https://git.gnome.org/browse/gdk-pixbuf/commit/?id=e9a5704edaa9aee9498f1fbf6e1b70fcce2e55aa", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.gnome.org/browse/gdk-pixbuf/commit/?id=e9a5704edaa9aee9498f1fbf6e1b70fcce2e55aa" }, { "reference_url": "http://www.debian.org/security/2015/dsa-3378", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2015/dsa-3378" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/10/01/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/10/01/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/10/01/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/10/01/7" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/10/02/10", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/10/02/10" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2015/10/05/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2015/10/05/7" }, { "reference_url": "http://www.securityfocus.com/bid/76955", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/76955" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2767-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-2767-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1268249", "reference_id": "1268249", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1268249" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7674", "reference_id": "CVE-2015-7674", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7674" }, { "reference_url": "https://security.gentoo.org/glsa/201512-05", "reference_id": "GLSA-201512-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201512-05" }, { "reference_url": "https://usn.ubuntu.com/2767-1/", "reference_id": "USN-2767-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2767-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922919?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.32.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.32.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2015-7674" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qwv5-ntpt-mbbp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/81048?format=api", "vulnerability_id": "VCID-rzj1-83cd-4yer", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-03/msg00124.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2016-06/msg00006.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7552.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7552.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7552", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01699", "scoring_system": "epss", "scoring_elements": "0.82214", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01699", "scoring_system": "epss", "scoring_elements": "0.82319", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01699", "scoring_system": "epss", "scoring_elements": "0.82296", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01699", "scoring_system": "epss", "scoring_elements": "0.8229", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01699", "scoring_system": "epss", "scoring_elements": "0.82284", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01699", "scoring_system": "epss", "scoring_elements": "0.82227", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01699", "scoring_system": "epss", "scoring_elements": "0.82247", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01699", "scoring_system": "epss", "scoring_elements": "0.82242", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01699", "scoring_system": "epss", "scoring_elements": "0.82269", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01699", "scoring_system": "epss", "scoring_elements": "0.82276", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7552" }, { "reference_url": "https://bugzilla.suse.com/show_bug.cgi?id=958963", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.suse.com/show_bug.cgi?id=958963" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7552", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7552" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8875", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8875" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SJF5ARFOX4BFUK6YCBKGAKBQYECO3AI2/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SJF5ARFOX4BFUK6YCBKGAKBQYECO3AI2/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSAZ6UCKKXC5VOWXGWQHOX2ZBLLATIOT/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VSAZ6UCKKXC5VOWXGWQHOX2ZBLLATIOT/" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3589", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2016/dsa-3589" }, { "reference_url": "http://www.ubuntu.com/usn/USN-3085-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-3085-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378894", "reference_id": "1378894", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1378894" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7552", "reference_id": "CVE-2015-7552", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7552" }, { "reference_url": "https://usn.ubuntu.com/3085-1/", "reference_id": "USN-3085-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3085-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922918?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.32.0-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.32.0-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2015-7552" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rzj1-83cd-4yer" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/45502?format=api", "vulnerability_id": "VCID-syr2-zvtz-f3au", "summary": "Multiple vulnerabilities in gdk-pixbuf may create a Denial of\n Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2370.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2370.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2370", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02266", "scoring_system": "epss", "scoring_elements": "0.84555", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02266", "scoring_system": "epss", "scoring_elements": "0.84571", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02266", "scoring_system": "epss", "scoring_elements": "0.84592", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02266", "scoring_system": "epss", "scoring_elements": "0.84595", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02266", "scoring_system": "epss", "scoring_elements": "0.84617", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02266", "scoring_system": "epss", "scoring_elements": "0.84624", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02266", "scoring_system": "epss", "scoring_elements": "0.84643", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02266", "scoring_system": "epss", "scoring_elements": "0.84638", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02266", "scoring_system": "epss", "scoring_elements": "0.84633", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02266", "scoring_system": "epss", "scoring_elements": "0.84654", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2370" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2370", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2370" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=822468", "reference_id": "822468", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=822468" }, { "reference_url": "https://security.gentoo.org/glsa/201206-20", "reference_id": "GLSA-201206-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201206-20" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0135", "reference_id": "RHSA-2013:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0135" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922916?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.26.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.26.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-2370" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-syr2-zvtz-f3au" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38813?format=api", "vulnerability_id": "VCID-v9xs-ur2x-jygb", "summary": "Multiple vulnerabilities were found in Pidgin, the worst of which\n allowing for the remote execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2485.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2485.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2485", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.71463", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.7147", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.71487", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.7146", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.715", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.71512", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.71535", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.71519", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.71501", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00677", "scoring_system": "epss", "scoring_elements": "0.71547", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2485" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2485", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2485" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=631524", "reference_id": "631524", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=631524" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=715337", "reference_id": "715337", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=715337" }, { "reference_url": "https://security.gentoo.org/glsa/201206-11", "reference_id": "GLSA-201206-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201206-11" }, { "reference_url": "https://security.gentoo.org/glsa/201206-20", "reference_id": "GLSA-201206-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201206-20" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922914?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.23.3-3.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.23.3-3.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-2485" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v9xs-ur2x-jygb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80649?format=api", "vulnerability_id": "VCID-vcfh-3p9e-4uc3", "summary": "gdk-pixbuf: integer wraparound in the GIF loader of gdk-pixbuf via crafted input leads to segmentation fault", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20240.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20240.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20240", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00794", "scoring_system": "epss", "scoring_elements": "0.73884", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00794", "scoring_system": "epss", "scoring_elements": "0.73894", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00794", "scoring_system": "epss", "scoring_elements": "0.73918", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00794", "scoring_system": "epss", "scoring_elements": "0.73889", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00794", "scoring_system": "epss", "scoring_elements": "0.73924", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00794", "scoring_system": "epss", "scoring_elements": "0.73937", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00794", "scoring_system": "epss", "scoring_elements": "0.73959", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00794", "scoring_system": "epss", "scoring_elements": "0.73941", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00794", "scoring_system": "epss", "scoring_elements": "0.73933", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00794", "scoring_system": "epss", "scoring_elements": "0.73974", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20240" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20240", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20240" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926787", "reference_id": "1926787", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926787" }, { "reference_url": "https://usn.ubuntu.com/4743-1/", "reference_id": "USN-4743-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4743-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922925?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2021-20240" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vcfh-3p9e-4uc3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89537?format=api", "vulnerability_id": "VCID-wrze-mrwx-nfdv", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0111.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0111.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0111", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01347", "scoring_system": "epss", "scoring_elements": "0.8003", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01347", "scoring_system": "epss", "scoring_elements": "0.80037", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01347", "scoring_system": "epss", "scoring_elements": "0.80058", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01347", "scoring_system": "epss", "scoring_elements": "0.80048", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01347", "scoring_system": "epss", "scoring_elements": "0.80076", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01347", "scoring_system": "epss", "scoring_elements": "0.80084", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01347", "scoring_system": "epss", "scoring_elements": "0.80104", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01347", "scoring_system": "epss", "scoring_elements": "0.80088", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01347", "scoring_system": "epss", "scoring_elements": "0.80079", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01347", "scoring_system": "epss", "scoring_elements": "0.80108", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0111" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0111", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0111" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617155", "reference_id": "1617155", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2004:102", "reference_id": "RHSA-2004:102", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2004:102" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2004:103", "reference_id": "RHSA-2004:103", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2004:103" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922906?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@0.22.0-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@0.22.0-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2004-0111" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wrze-mrwx-nfdv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69437?format=api", "vulnerability_id": "VCID-xg3j-c698-3kgu", "summary": "gdk-pixbuf: Uninitialized Memory Disclosure in GdkPixbuf GIF LZW Decoder", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6199.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6199.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-6199", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06599", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.0655", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06582", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06633", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06675", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06676", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06669", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24378", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24361", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-6199" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6199", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6199" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107994", "reference_id": "1107994", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107994" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373147", "reference_id": "2373147", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:43:00Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373147" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10", "reference_id": "cpe:/o:redhat:enterprise_linux:10", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8", "reference_id": "cpe:/o:redhat:enterprise_linux:8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9", "reference_id": "cpe:/o:redhat:enterprise_linux:9", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2025-6199", "reference_id": "CVE-2025-6199", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:43:00Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2025-6199" }, { "reference_url": "https://usn.ubuntu.com/7662-1/", "reference_id": "USN-7662-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7662-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922932?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922931?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922933?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-6199" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xg3j-c698-3kgu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63891?format=api", "vulnerability_id": "VCID-xg6z-9vh5-pbd6", "summary": "gdk-pixbuf: gdk-pixbuf: Denial of Service via heap-based buffer overflow when processing a specially crafted JPEG image", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5201.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-5201.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5201", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25506", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00089", "scoring_system": "epss", "scoring_elements": "0.25544", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30679", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30621", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30625", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30669", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30715", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30711", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0013", "scoring_system": "epss", "scoring_elements": "0.32436", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-5201" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5201", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5201" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132501", "reference_id": "1132501", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1132501" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453291", "reference_id": "2453291", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-31T13:45:53Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453291" }, { "reference_url": "https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/304", "reference_id": "304", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-31T13:45:53Z/" } ], "url": "https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/issues/304" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10", "reference_id": "cpe:/o:redhat:enterprise_linux:10", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8", "reference_id": "cpe:/o:redhat:enterprise_linux:8", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9", "reference_id": "cpe:/o:redhat:enterprise_linux:9", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2026-5201", "reference_id": "CVE-2026-5201", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-31T13:45:53Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2026-5201" }, { "reference_url": "https://usn.ubuntu.com/8156-1/", "reference_id": "USN-8156-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/8156-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066825?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u5?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u5%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1062464?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1062465?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4%2Bdeb13u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%252Bdeb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2026-5201" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xg6z-9vh5-pbd6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89416?format=api", "vulnerability_id": "VCID-y1dx-tg6t-aqe4", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0788.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0788.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0788", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.1293", "scoring_system": "epss", "scoring_elements": "0.94022", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.1293", "scoring_system": "epss", "scoring_elements": "0.94032", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.1293", "scoring_system": "epss", "scoring_elements": "0.94043", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.1293", "scoring_system": "epss", "scoring_elements": "0.94046", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.1293", "scoring_system": "epss", "scoring_elements": "0.94054", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.1293", "scoring_system": "epss", "scoring_elements": "0.94058", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.1293", "scoring_system": "epss", "scoring_elements": "0.94063", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.1293", "scoring_system": "epss", "scoring_elements": "0.94079", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0788" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0788", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0788" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617290", "reference_id": "1617290", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617290" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2004:447", "reference_id": "RHSA-2004:447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2004:447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2004:466", "reference_id": "RHSA-2004:466", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2004:466" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922911?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@0.22.0-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@0.22.0-7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2004-0788" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y1dx-tg6t-aqe4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71801?format=api", "vulnerability_id": "VCID-y1sm-7uec-1bc5", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2862.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2862.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2862", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05689", "scoring_system": "epss", "scoring_elements": "0.90362", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05689", "scoring_system": "epss", "scoring_elements": "0.90418", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05689", "scoring_system": "epss", "scoring_elements": "0.90408", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05689", "scoring_system": "epss", "scoring_elements": "0.90402", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05689", "scoring_system": "epss", "scoring_elements": "0.90364", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05689", "scoring_system": "epss", "scoring_elements": "0.90376", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05689", "scoring_system": "epss", "scoring_elements": "0.90381", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05689", "scoring_system": "epss", "scoring_elements": "0.90394", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05689", "scoring_system": "epss", "scoring_elements": "0.90401", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05689", "scoring_system": "epss", "scoring_elements": "0.90409", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2862" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2862", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2862" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1488817", "reference_id": "1488817", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1488817" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874552", "reference_id": "874552", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=874552" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3140", "reference_id": "RHSA-2018:3140", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3140" }, { "reference_url": "https://usn.ubuntu.com/3418-1/", "reference_id": "USN-3418-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3418-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922923?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.36.10-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.36.10-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-2862" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y1sm-7uec-1bc5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89434?format=api", "vulnerability_id": "VCID-ysbh-ym55-nkbh", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0753.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0753.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0753", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.1204", "scoring_system": "epss", "scoring_elements": "0.93744", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.1204", "scoring_system": "epss", "scoring_elements": "0.93753", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.1204", "scoring_system": "epss", "scoring_elements": "0.93764", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.1204", "scoring_system": "epss", "scoring_elements": "0.93767", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.1204", "scoring_system": "epss", "scoring_elements": "0.93776", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.1204", "scoring_system": "epss", "scoring_elements": "0.93778", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.1204", "scoring_system": "epss", "scoring_elements": "0.93783", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.1204", "scoring_system": "epss", "scoring_elements": "0.93784", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.1204", "scoring_system": "epss", "scoring_elements": "0.93806", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0753" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0753", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0753" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617266", "reference_id": "1617266", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617266" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2004:447", "reference_id": "RHSA-2004:447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2004:447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2004:466", "reference_id": "RHSA-2004:466", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2004:466" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922911?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@0.22.0-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@0.22.0-7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2004-0753" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ysbh-ym55-nkbh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35045?format=api", "vulnerability_id": "VCID-zu3p-941y-nydy", "summary": "A vulnerability has been found in GDK-PixBuf that may allow a\n remote attacker to execute arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000422.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-1000422.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000422", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00961", "scoring_system": "epss", "scoring_elements": "0.76427", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00961", "scoring_system": "epss", "scoring_elements": "0.76528", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00961", "scoring_system": "epss", "scoring_elements": "0.76488", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00961", "scoring_system": "epss", "scoring_elements": "0.76514", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00961", "scoring_system": "epss", "scoring_elements": "0.76493", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00961", "scoring_system": "epss", "scoring_elements": "0.76431", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00961", "scoring_system": "epss", "scoring_elements": "0.7646", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00961", "scoring_system": "epss", "scoring_elements": "0.76442", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00961", "scoring_system": "epss", "scoring_elements": "0.76474", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-1000422" }, { "reference_url": "https://bugzilla.gnome.org/show_bug.cgi?id=785973", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.gnome.org/show_bug.cgi?id=785973" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000422", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000422" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00007.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00007.html" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4088", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4088" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531397", "reference_id": "1531397", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531397" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:gdk-pixbuf:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000422", "reference_id": "CVE-2017-1000422", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000422" }, { "reference_url": "https://security.gentoo.org/glsa/201804-14", "reference_id": "GLSA-201804-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201804-14" }, { "reference_url": "https://usn.ubuntu.com/3532-1/", "reference_id": "USN-3532-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3532-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/922922?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.36.11-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.36.11-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922907?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.2%2Bdfsg-1%2Bdeb11u2?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.2%252Bdfsg-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922905?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.10%2Bdfsg-1%2Bdeb12u3?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.10%252Bdfsg-1%252Bdeb12u3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922910?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.42.12%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.42.12%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922908?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.5%2Bdfsg-4?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-xg6z-9vh5-pbd6" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.5%252Bdfsg-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/922909?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1000438?format=api", "purl": "pkg:deb/debian/gdk-pixbuf@2.44.6%2Bdfsg-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-1000422" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zu3p-941y-nydy" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/gdk-pixbuf@2.44.6%252Bdfsg-1%3Fdistro=trixie" }