Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
Typedeb
Namespacedebian
Nameglib2.0
Version2.66.8-1+deb11u4
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.66.8-1+deb11u5
Latest_non_vulnerable_version2.88.0-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1z8y-cqmn-s7gc
vulnerability_id VCID-1z8y-cqmn-s7gc
summary
PCRE is vulnerable to multiple buffer overflow and memory corruption
    vulnerabilities, possibly leading to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1659.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1659.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1659
reference_id
reference_type
scores
0
value 0.05344
scoring_system epss
scoring_elements 0.90024
published_at 2026-04-01T12:55:00Z
1
value 0.05344
scoring_system epss
scoring_elements 0.90027
published_at 2026-04-02T12:55:00Z
2
value 0.05344
scoring_system epss
scoring_elements 0.90039
published_at 2026-04-04T12:55:00Z
3
value 0.05344
scoring_system epss
scoring_elements 0.90043
published_at 2026-04-07T12:55:00Z
4
value 0.05344
scoring_system epss
scoring_elements 0.90059
published_at 2026-04-08T12:55:00Z
5
value 0.05344
scoring_system epss
scoring_elements 0.90064
published_at 2026-04-09T12:55:00Z
6
value 0.05344
scoring_system epss
scoring_elements 0.90073
published_at 2026-04-11T12:55:00Z
7
value 0.05344
scoring_system epss
scoring_elements 0.90071
published_at 2026-04-12T12:55:00Z
8
value 0.05344
scoring_system epss
scoring_elements 0.90065
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1659
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1659
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=315871
reference_id 315871
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=315871
4
reference_url https://security.gentoo.org/glsa/200711-30
reference_id GLSA-200711-30
reference_type
scores
url https://security.gentoo.org/glsa/200711-30
5
reference_url https://access.redhat.com/errata/RHSA-2007:0967
reference_id RHSA-2007:0967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0967
6
reference_url https://access.redhat.com/errata/RHSA-2007:1068
reference_id RHSA-2007:1068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1068
7
reference_url https://usn.ubuntu.com/547-1/
reference_id USN-547-1
reference_type
scores
url https://usn.ubuntu.com/547-1/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.14.3-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.14.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.14.3-1%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2007-1659
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1z8y-cqmn-s7gc
1
url VCID-2dcv-wbjk-tqh8
vulnerability_id VCID-2dcv-wbjk-tqh8
summary
PCRE is vulnerable to multiple buffer overflow and memory corruption
    vulnerabilities, possibly leading to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4767.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4767.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4767
reference_id
reference_type
scores
0
value 0.01955
scoring_system epss
scoring_elements 0.83412
published_at 2026-04-01T12:55:00Z
1
value 0.01955
scoring_system epss
scoring_elements 0.83426
published_at 2026-04-02T12:55:00Z
2
value 0.01955
scoring_system epss
scoring_elements 0.8344
published_at 2026-04-04T12:55:00Z
3
value 0.01955
scoring_system epss
scoring_elements 0.83439
published_at 2026-04-07T12:55:00Z
4
value 0.01955
scoring_system epss
scoring_elements 0.83464
published_at 2026-04-08T12:55:00Z
5
value 0.01955
scoring_system epss
scoring_elements 0.83473
published_at 2026-04-09T12:55:00Z
6
value 0.01955
scoring_system epss
scoring_elements 0.83488
published_at 2026-04-11T12:55:00Z
7
value 0.01955
scoring_system epss
scoring_elements 0.83482
published_at 2026-04-12T12:55:00Z
8
value 0.01955
scoring_system epss
scoring_elements 0.83477
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4767
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4767
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=392901
reference_id 392901
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=392901
4
reference_url https://security.gentoo.org/glsa/200711-30
reference_id GLSA-200711-30
reference_type
scores
url https://security.gentoo.org/glsa/200711-30
5
reference_url https://usn.ubuntu.com/547-1/
reference_id USN-547-1
reference_type
scores
url https://usn.ubuntu.com/547-1/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.14.3-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.14.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.14.3-1%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2007-4767
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2dcv-wbjk-tqh8
2
url VCID-4em6-3x32-ybcv
vulnerability_id VCID-4em6-3x32-ybcv
summary
Uncontrolled Resource Consumption
A flaw was found in GLib. GVariant deserialization is vulnerable to a slowdown issue where a crafted GVariant can cause excessive processing, leading to denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32611.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32611.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32611
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.10018
published_at 2026-04-02T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.10075
published_at 2026-04-04T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09973
published_at 2026-04-07T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.1005
published_at 2026-04-08T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.1011
published_at 2026-04-12T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.1015
published_at 2026-04-11T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.10088
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32611
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2211829
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2211829
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32611
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://gitlab.gnome.org/GNOME/glib/-/issues/2797
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/glib/-/issues/2797
6
reference_url https://access.redhat.com/security/cve/CVE-2023-32611
reference_id CVE-2023-32611
reference_type
scores
url https://access.redhat.com/security/cve/CVE-2023-32611
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-32611
reference_id CVE-2023-32611
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-32611
8
reference_url https://security.gentoo.org/glsa/202311-18
reference_id GLSA-202311-18
reference_type
scores
url https://security.gentoo.org/glsa/202311-18
9
reference_url https://access.redhat.com/errata/RHSA-2023:6631
reference_id RHSA-2023:6631
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6631
10
reference_url https://access.redhat.com/errata/RHSA-2024:2528
reference_id RHSA-2024:2528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2528
11
reference_url https://usn.ubuntu.com/6165-1/
reference_id USN-6165-1
reference_type
scores
url https://usn.ubuntu.com/6165-1/
12
reference_url https://usn.ubuntu.com/6165-2/
reference_id USN-6165-2
reference_type
scores
url https://usn.ubuntu.com/6165-2/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.4-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.4-1%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
5
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2023-32611
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4em6-3x32-ybcv
3
url VCID-6xng-bfkg-jfa4
vulnerability_id VCID-6xng-bfkg-jfa4
summary glib: Integer overflow in in g_escape_uri_string()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13601.json
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13601.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13601
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01286
published_at 2026-04-13T12:55:00Z
1
value 0.00011
scoring_system epss
scoring_elements 0.01285
published_at 2026-04-04T12:55:00Z
2
value 0.00011
scoring_system epss
scoring_elements 0.01295
published_at 2026-04-07T12:55:00Z
3
value 0.00011
scoring_system epss
scoring_elements 0.01301
published_at 2026-04-08T12:55:00Z
4
value 0.00011
scoring_system epss
scoring_elements 0.01304
published_at 2026-04-09T12:55:00Z
5
value 0.00011
scoring_system epss
scoring_elements 0.01288
published_at 2026-04-11T12:55:00Z
6
value 0.00011
scoring_system epss
scoring_elements 0.01283
published_at 2026-04-12T12:55:00Z
7
value 0.00011
scoring_system epss
scoring_elements 0.01281
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13601
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13601
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121488
reference_id 1121488
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121488
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416741
reference_id 2416741
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2416741
6
reference_url https://gitlab.gnome.org/GNOME/glib/-/issues/3827
reference_id 3827
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/
url https://gitlab.gnome.org/GNOME/glib/-/issues/3827
7
reference_url https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914
reference_id 4914
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/
url https://gitlab.gnome.org/GNOME/glib/-/merge_requests/4914
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:8::el9
reference_id cpe:/a:redhat:ceph_storage:8::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:8::el9
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
reference_id cpe:/a:redhat:discovery:2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
reference_id cpe:/a:redhat:hummingbird:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
reference_id cpe:/a:redhat:insights_proxy:1.5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el8
reference_id cpe:/a:redhat:openshift:4.12::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.12::el8
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el9
reference_id cpe:/a:redhat:openshift:4.13::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.13::el9
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el9
reference_id cpe:/a:redhat:openshift:4.14::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.14::el9
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el9
reference_id cpe:/a:redhat:openshift:4.15::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.15::el9
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.16::el9
reference_id cpe:/a:redhat:openshift:4.16::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.16::el9
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.17::el9
reference_id cpe:/a:redhat:openshift:4.17::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.17::el9
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.18::el9
reference_id cpe:/a:redhat:openshift:4.18::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.18::el9
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.19::el9
reference_id cpe:/a:redhat:openshift:4.19::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4.19::el9
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
reference_id cpe:/a:redhat:rhel_eus:9.4::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
reference_id cpe:/a:redhat:rhel_eus:9.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::crb
reference_id cpe:/a:redhat:rhel_eus:9.6::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::crb
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhui:5::el9
reference_id cpe:/a:redhat:rhui:5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhui:5::el9
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
reference_id cpe:/o:redhat:enterprise_linux_eus:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.0::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.6::baseos
reference_id cpe:/o:redhat:rhel_eus:9.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.6::baseos
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_id cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos
reference_id cpe:/o:redhat:rhel_tus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos
51
reference_url https://access.redhat.com/security/cve/CVE-2025-13601
reference_id CVE-2025-13601
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/
url https://access.redhat.com/security/cve/CVE-2025-13601
52
reference_url https://access.redhat.com/errata/RHSA-2026:0936
reference_id RHSA-2026:0936
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/
url https://access.redhat.com/errata/RHSA-2026:0936
53
reference_url https://access.redhat.com/errata/RHSA-2026:0975
reference_id RHSA-2026:0975
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/
url https://access.redhat.com/errata/RHSA-2026:0975
54
reference_url https://access.redhat.com/errata/RHSA-2026:0991
reference_id RHSA-2026:0991
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/
url https://access.redhat.com/errata/RHSA-2026:0991
55
reference_url https://access.redhat.com/errata/RHSA-2026:1323
reference_id RHSA-2026:1323
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/
url https://access.redhat.com/errata/RHSA-2026:1323
56
reference_url https://access.redhat.com/errata/RHSA-2026:1324
reference_id RHSA-2026:1324
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/
url https://access.redhat.com/errata/RHSA-2026:1324
57
reference_url https://access.redhat.com/errata/RHSA-2026:1326
reference_id RHSA-2026:1326
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/
url https://access.redhat.com/errata/RHSA-2026:1326
58
reference_url https://access.redhat.com/errata/RHSA-2026:1327
reference_id RHSA-2026:1327
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/
url https://access.redhat.com/errata/RHSA-2026:1327
59
reference_url https://access.redhat.com/errata/RHSA-2026:1465
reference_id RHSA-2026:1465
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/
url https://access.redhat.com/errata/RHSA-2026:1465
60
reference_url https://access.redhat.com/errata/RHSA-2026:1608
reference_id RHSA-2026:1608
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/
url https://access.redhat.com/errata/RHSA-2026:1608
61
reference_url https://access.redhat.com/errata/RHSA-2026:1624
reference_id RHSA-2026:1624
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/
url https://access.redhat.com/errata/RHSA-2026:1624
62
reference_url https://access.redhat.com/errata/RHSA-2026:1625
reference_id RHSA-2026:1625
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/
url https://access.redhat.com/errata/RHSA-2026:1625
63
reference_url https://access.redhat.com/errata/RHSA-2026:1626
reference_id RHSA-2026:1626
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/
url https://access.redhat.com/errata/RHSA-2026:1626
64
reference_url https://access.redhat.com/errata/RHSA-2026:1627
reference_id RHSA-2026:1627
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/
url https://access.redhat.com/errata/RHSA-2026:1627
65
reference_url https://access.redhat.com/errata/RHSA-2026:1652
reference_id RHSA-2026:1652
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/
url https://access.redhat.com/errata/RHSA-2026:1652
66
reference_url https://access.redhat.com/errata/RHSA-2026:1736
reference_id RHSA-2026:1736
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/
url https://access.redhat.com/errata/RHSA-2026:1736
67
reference_url https://access.redhat.com/errata/RHSA-2026:2064
reference_id RHSA-2026:2064
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/
url https://access.redhat.com/errata/RHSA-2026:2064
68
reference_url https://access.redhat.com/errata/RHSA-2026:2072
reference_id RHSA-2026:2072
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/
url https://access.redhat.com/errata/RHSA-2026:2072
69
reference_url https://access.redhat.com/errata/RHSA-2026:2485
reference_id RHSA-2026:2485
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/
url https://access.redhat.com/errata/RHSA-2026:2485
70
reference_url https://access.redhat.com/errata/RHSA-2026:2563
reference_id RHSA-2026:2563
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/
url https://access.redhat.com/errata/RHSA-2026:2563
71
reference_url https://access.redhat.com/errata/RHSA-2026:2633
reference_id RHSA-2026:2633
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/
url https://access.redhat.com/errata/RHSA-2026:2633
72
reference_url https://access.redhat.com/errata/RHSA-2026:2659
reference_id RHSA-2026:2659
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/
url https://access.redhat.com/errata/RHSA-2026:2659
73
reference_url https://access.redhat.com/errata/RHSA-2026:2671
reference_id RHSA-2026:2671
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/
url https://access.redhat.com/errata/RHSA-2026:2671
74
reference_url https://access.redhat.com/errata/RHSA-2026:2974
reference_id RHSA-2026:2974
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/
url https://access.redhat.com/errata/RHSA-2026:2974
75
reference_url https://access.redhat.com/errata/RHSA-2026:3415
reference_id RHSA-2026:3415
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/
url https://access.redhat.com/errata/RHSA-2026:3415
76
reference_url https://access.redhat.com/errata/RHSA-2026:4419
reference_id RHSA-2026:4419
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-26T14:58:08Z/
url https://access.redhat.com/errata/RHSA-2026:4419
77
reference_url https://usn.ubuntu.com/7942-1/
reference_id USN-7942-1
reference_type
scores
url https://usn.ubuntu.com/7942-1/
78
reference_url https://usn.ubuntu.com/7942-2/
reference_id USN-7942-2
reference_type
scores
url https://usn.ubuntu.com/7942-2/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u7%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.86.3-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.86.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.86.3-1%3Fdistro=trixie
5
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2025-13601
risk_score 3.5
exploitability 0.5
weighted_severity 6.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6xng-bfkg-jfa4
4
url VCID-7ck1-vwbt-9qhd
vulnerability_id VCID-7ck1-vwbt-9qhd
summary glib: Mishandling of proxy_addr field in GSocketClient may lead to proxy being ignored
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6750.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-6750.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-6750
reference_id
reference_type
scores
0
value 0.00587
scoring_system epss
scoring_elements 0.6904
published_at 2026-04-01T12:55:00Z
1
value 0.00587
scoring_system epss
scoring_elements 0.69057
published_at 2026-04-02T12:55:00Z
2
value 0.00587
scoring_system epss
scoring_elements 0.69079
published_at 2026-04-04T12:55:00Z
3
value 0.00587
scoring_system epss
scoring_elements 0.69059
published_at 2026-04-07T12:55:00Z
4
value 0.00587
scoring_system epss
scoring_elements 0.69109
published_at 2026-04-08T12:55:00Z
5
value 0.00587
scoring_system epss
scoring_elements 0.69128
published_at 2026-04-09T12:55:00Z
6
value 0.00587
scoring_system epss
scoring_elements 0.69151
published_at 2026-04-11T12:55:00Z
7
value 0.00587
scoring_system epss
scoring_elements 0.69136
published_at 2026-04-12T12:55:00Z
8
value 0.00587
scoring_system epss
scoring_elements 0.69106
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-6750
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6750
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6750
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.gnome.org/GNOME/glib/issues/1989
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/glib/issues/1989
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1790288
reference_id 1790288
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1790288
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=948554
reference_id 948554
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=948554
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-6750
reference_id CVE-2020-6750
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2020-6750
fixed_packages
0
url pkg:deb/debian/glib2.0@2.62.5-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.62.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.62.5-1%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2020-6750
risk_score 3.0
exploitability 0.5
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ck1-vwbt-9qhd
5
url VCID-7ruc-s4au-kqe5
vulnerability_id VCID-7ruc-s4au-kqe5
summary glib: glib crash after long command line
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4056.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4056.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-4056
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.26708
published_at 2026-04-11T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.26703
published_at 2026-04-09T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26802
published_at 2026-04-04T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26653
published_at 2026-04-08T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.26585
published_at 2026-04-07T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26761
published_at 2026-04-02T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26663
published_at 2026-04-12T12:55:00Z
7
value 0.00102
scoring_system epss
scoring_elements 0.2807
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-4056
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2362826
reference_id 2362826
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T13:24:15Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2362826
3
reference_url https://gitlab.gnome.org/GNOME/glib/-/issues/3668
reference_id 3668
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T13:24:15Z/
url https://gitlab.gnome.org/GNOME/glib/-/issues/3668
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
9
reference_url https://access.redhat.com/security/cve/CVE-2025-4056
reference_id CVE-2025-4056
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T13:24:15Z/
url https://access.redhat.com/security/cve/CVE-2025-4056
fixed_packages
0
url pkg:deb/debian/glib2.0@0?distro=trixie
purl pkg:deb/debian/glib2.0@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@0%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2025-4056
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ruc-s4au-kqe5
6
url VCID-817e-zas3-6yf6
vulnerability_id VCID-817e-zas3-6yf6
summary glibc: GLib prior to 2.82.5 is vulnerable to integer overflow and buffer under-read when parsing a very long invalid ISO 8601 timestamp with g_date_time_new_from_iso8601().
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-3360.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-3360.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-3360
reference_id
reference_type
scores
0
value 0.00392
scoring_system epss
scoring_elements 0.60218
published_at 2026-04-13T12:55:00Z
1
value 0.00392
scoring_system epss
scoring_elements 0.60169
published_at 2026-04-02T12:55:00Z
2
value 0.00392
scoring_system epss
scoring_elements 0.60227
published_at 2026-04-09T12:55:00Z
3
value 0.00392
scoring_system epss
scoring_elements 0.60249
published_at 2026-04-11T12:55:00Z
4
value 0.00392
scoring_system epss
scoring_elements 0.60235
published_at 2026-04-12T12:55:00Z
5
value 0.00392
scoring_system epss
scoring_elements 0.60194
published_at 2026-04-04T12:55:00Z
6
value 0.00392
scoring_system epss
scoring_elements 0.60163
published_at 2026-04-07T12:55:00Z
7
value 0.00392
scoring_system epss
scoring_elements 0.60213
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-3360
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3360
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357754
reference_id 2357754
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-07T13:23:42Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2357754
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
10
reference_url https://access.redhat.com/security/cve/CVE-2025-3360
reference_id CVE-2025-3360
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-07T13:23:42Z/
url https://access.redhat.com/security/cve/CVE-2025-3360
11
reference_url https://usn.ubuntu.com/7942-1/
reference_id USN-7942-1
reference_type
scores
url https://usn.ubuntu.com/7942-1/
12
reference_url https://usn.ubuntu.com/7942-2/
reference_id USN-7942-2
reference_type
scores
url https://usn.ubuntu.com/7942-2/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u6?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u6%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u6?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u6%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.84.1-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.1-1%3Fdistro=trixie
5
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
6
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2025-3360
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-817e-zas3-6yf6
7
url VCID-83s2-671n-zugn
vulnerability_id VCID-83s2-671n-zugn
summary glib2: file_copy_fallback in gio/gfile.c in GNOME GLib does not properly restrict file permissions while a copy operation is in progress
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12450.json
reference_id
reference_type
scores
0
value 6.6
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12450.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-12450
reference_id
reference_type
scores
0
value 0.00788
scoring_system epss
scoring_elements 0.73835
published_at 2026-04-13T12:55:00Z
1
value 0.00788
scoring_system epss
scoring_elements 0.73826
published_at 2026-04-08T12:55:00Z
2
value 0.00788
scoring_system epss
scoring_elements 0.73839
published_at 2026-04-09T12:55:00Z
3
value 0.00788
scoring_system epss
scoring_elements 0.73861
published_at 2026-04-11T12:55:00Z
4
value 0.00788
scoring_system epss
scoring_elements 0.73843
published_at 2026-04-12T12:55:00Z
5
value 0.00788
scoring_system epss
scoring_elements 0.73791
published_at 2026-04-07T12:55:00Z
6
value 0.00923
scoring_system epss
scoring_elements 0.7594
published_at 2026-04-02T12:55:00Z
7
value 0.00923
scoring_system epss
scoring_elements 0.75972
published_at 2026-04-04T12:55:00Z
8
value 0.00923
scoring_system epss
scoring_elements 0.75936
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-12450
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12450
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12450
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1719141
reference_id 1719141
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1719141
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929753
reference_id 929753
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=929753
6
reference_url https://access.redhat.com/errata/RHSA-2019:3530
reference_id RHSA-2019:3530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3530
7
reference_url https://access.redhat.com/errata/RHSA-2020:3978
reference_id RHSA-2020:3978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3978
8
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
9
reference_url https://usn.ubuntu.com/4014-1/
reference_id USN-4014-1
reference_type
scores
url https://usn.ubuntu.com/4014-1/
10
reference_url https://usn.ubuntu.com/4014-2/
reference_id USN-4014-2
reference_type
scores
url https://usn.ubuntu.com/4014-2/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.58.3-2?distro=trixie
purl pkg:deb/debian/glib2.0@2.58.3-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.58.3-2%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2019-12450
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-83s2-671n-zugn
8
url VCID-a9dn-qcuy-f7cs
vulnerability_id VCID-a9dn-qcuy-f7cs
summary Glib: GLib: Memory corruption via integer overflow in Unicode case conversion
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1489.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1489.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1489
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.18192
published_at 2026-04-04T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.18139
published_at 2026-04-02T12:55:00Z
2
value 0.00066
scoring_system epss
scoring_elements 0.20497
published_at 2026-04-13T12:55:00Z
3
value 0.00066
scoring_system epss
scoring_elements 0.20431
published_at 2026-04-07T12:55:00Z
4
value 0.00066
scoring_system epss
scoring_elements 0.20514
published_at 2026-04-08T12:55:00Z
5
value 0.00066
scoring_system epss
scoring_elements 0.20571
published_at 2026-04-09T12:55:00Z
6
value 0.00066
scoring_system epss
scoring_elements 0.20593
published_at 2026-04-11T12:55:00Z
7
value 0.00066
scoring_system epss
scoring_elements 0.20549
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1489
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1489
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126549
reference_id 1126549
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126549
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2433348
reference_id 2433348
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T15:09:00Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2433348
6
reference_url https://gitlab.gnome.org/GNOME/glib/-/issues/3872
reference_id 3872
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T15:09:00Z/
url https://gitlab.gnome.org/GNOME/glib/-/issues/3872
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
12
reference_url https://access.redhat.com/security/cve/CVE-2026-1489
reference_id CVE-2026-1489
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T15:09:00Z/
url https://access.redhat.com/security/cve/CVE-2026-1489
13
reference_url https://usn.ubuntu.com/8017-1/
reference_id USN-8017-1
reference_type
scores
url https://usn.ubuntu.com/8017-1/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u8%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.86.3-5?distro=trixie
purl pkg:deb/debian/glib2.0@2.86.3-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.86.3-5%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2026-1489
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a9dn-qcuy-f7cs
9
url VCID-bfyu-jryn-eyak
vulnerability_id VCID-bfyu-jryn-eyak
summary
Multiple vulnerabilities have been found in GLib, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28153.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-28153.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-28153
reference_id
reference_type
scores
0
value 0.00574
scoring_system epss
scoring_elements 0.68647
published_at 2026-04-01T12:55:00Z
1
value 0.00574
scoring_system epss
scoring_elements 0.68661
published_at 2026-04-07T12:55:00Z
2
value 0.00574
scoring_system epss
scoring_elements 0.68684
published_at 2026-04-04T12:55:00Z
3
value 0.00574
scoring_system epss
scoring_elements 0.68712
published_at 2026-04-08T12:55:00Z
4
value 0.00574
scoring_system epss
scoring_elements 0.6873
published_at 2026-04-09T12:55:00Z
5
value 0.00574
scoring_system epss
scoring_elements 0.68753
published_at 2026-04-11T12:55:00Z
6
value 0.00574
scoring_system epss
scoring_elements 0.68665
published_at 2026-04-02T12:55:00Z
7
value 0.00749
scoring_system epss
scoring_elements 0.73116
published_at 2026-04-13T12:55:00Z
8
value 0.00749
scoring_system epss
scoring_elements 0.73123
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-28153
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28153
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28153
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.gnome.org/GNOME/glib/-/issues/2325
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/glib/-/issues/2325
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1938291
reference_id 1938291
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1938291
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984969
reference_id 984969
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=984969
7
reference_url https://security.archlinux.org/AVG-1680
reference_id AVG-1680
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1680
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-28153
reference_id CVE-2021-28153
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-28153
9
reference_url https://security.gentoo.org/glsa/202107-13
reference_id GLSA-202107-13
reference_type
scores
url https://security.gentoo.org/glsa/202107-13
10
reference_url https://access.redhat.com/errata/RHSA-2021:4385
reference_id RHSA-2021:4385
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4385
11
reference_url https://access.redhat.com/errata/RHSA-2022:8418
reference_id RHSA-2022:8418
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8418
12
reference_url https://usn.ubuntu.com/4764-1/
reference_id USN-4764-1
reference_type
scores
url https://usn.ubuntu.com/4764-1/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.66.7-2?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.7-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.7-2%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2021-28153
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bfyu-jryn-eyak
10
url VCID-ca52-wfc7-2ubd
vulnerability_id VCID-ca52-wfc7-2ubd
summary
Multiple vulnerabilities have been found in GLib, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27219.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27219.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-27219
reference_id
reference_type
scores
0
value 0.01367
scoring_system epss
scoring_elements 0.80199
published_at 2026-04-13T12:55:00Z
1
value 0.01367
scoring_system epss
scoring_elements 0.80204
published_at 2026-04-12T12:55:00Z
2
value 0.02131
scoring_system epss
scoring_elements 0.84107
published_at 2026-04-01T12:55:00Z
3
value 0.02131
scoring_system epss
scoring_elements 0.84121
published_at 2026-04-02T12:55:00Z
4
value 0.02131
scoring_system epss
scoring_elements 0.84139
published_at 2026-04-04T12:55:00Z
5
value 0.02131
scoring_system epss
scoring_elements 0.8414
published_at 2026-04-07T12:55:00Z
6
value 0.02131
scoring_system epss
scoring_elements 0.84162
published_at 2026-04-08T12:55:00Z
7
value 0.02131
scoring_system epss
scoring_elements 0.84168
published_at 2026-04-09T12:55:00Z
8
value 0.02131
scoring_system epss
scoring_elements 0.84186
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-27219
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27219
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.gnome.org/GNOME/glib/-/issues/2319
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/glib/-/issues/2319
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1929858
reference_id 1929858
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1929858
6
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982778
reference_id 982778
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982778
7
reference_url https://security.archlinux.org/AVG-1574
reference_id AVG-1574
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1574
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-27219
reference_id CVE-2021-27219
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-27219
9
reference_url https://security.gentoo.org/glsa/202107-13
reference_id GLSA-202107-13
reference_type
scores
url https://security.gentoo.org/glsa/202107-13
10
reference_url https://access.redhat.com/errata/RHSA-2021:2147
reference_id RHSA-2021:2147
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2147
11
reference_url https://access.redhat.com/errata/RHSA-2021:2170
reference_id RHSA-2021:2170
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2170
12
reference_url https://access.redhat.com/errata/RHSA-2021:2171
reference_id RHSA-2021:2171
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2171
13
reference_url https://access.redhat.com/errata/RHSA-2021:2172
reference_id RHSA-2021:2172
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2172
14
reference_url https://access.redhat.com/errata/RHSA-2021:2173
reference_id RHSA-2021:2173
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2173
15
reference_url https://access.redhat.com/errata/RHSA-2021:2174
reference_id RHSA-2021:2174
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2174
16
reference_url https://access.redhat.com/errata/RHSA-2021:2175
reference_id RHSA-2021:2175
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2175
17
reference_url https://access.redhat.com/errata/RHSA-2021:2203
reference_id RHSA-2021:2203
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2203
18
reference_url https://access.redhat.com/errata/RHSA-2021:2204
reference_id RHSA-2021:2204
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2204
19
reference_url https://access.redhat.com/errata/RHSA-2021:2467
reference_id RHSA-2021:2467
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2467
20
reference_url https://access.redhat.com/errata/RHSA-2021:2519
reference_id RHSA-2021:2519
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2519
21
reference_url https://access.redhat.com/errata/RHSA-2021:2522
reference_id RHSA-2021:2522
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2522
22
reference_url https://access.redhat.com/errata/RHSA-2021:4526
reference_id RHSA-2021:4526
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4526
23
reference_url https://usn.ubuntu.com/4759-1/
reference_id USN-4759-1
reference_type
scores
url https://usn.ubuntu.com/4759-1/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.66.6-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.6-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.6-1%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2021-27219
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ca52-wfc7-2ubd
11
url VCID-cgcb-brxv-mqef
vulnerability_id VCID-cgcb-brxv-mqef
summary glib: Buffer Underflow on GLib through glib/gstring.c via function g_string_insert_unichar
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4373.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4373.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-4373
reference_id
reference_type
scores
0
value 0.00742
scoring_system epss
scoring_elements 0.72927
published_at 2026-04-02T12:55:00Z
1
value 0.00742
scoring_system epss
scoring_elements 0.7296
published_at 2026-04-08T12:55:00Z
2
value 0.00742
scoring_system epss
scoring_elements 0.72974
published_at 2026-04-09T12:55:00Z
3
value 0.00742
scoring_system epss
scoring_elements 0.72999
published_at 2026-04-11T12:55:00Z
4
value 0.00742
scoring_system epss
scoring_elements 0.72978
published_at 2026-04-12T12:55:00Z
5
value 0.00742
scoring_system epss
scoring_elements 0.72972
published_at 2026-04-13T12:55:00Z
6
value 0.00742
scoring_system epss
scoring_elements 0.72947
published_at 2026-04-04T12:55:00Z
7
value 0.00742
scoring_system epss
scoring_elements 0.72922
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-4373
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4373
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1104930
reference_id 1104930
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1104930
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2364265
reference_id 2364265
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T15:09:21Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2364265
6
reference_url https://gitlab.gnome.org/GNOME/glib/-/issues/3677
reference_id 3677
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T15:09:21Z/
url https://gitlab.gnome.org/GNOME/glib/-/issues/3677
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
reference_id cpe:/a:redhat:enterprise_linux:8::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::crb
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
reference_id cpe:/a:redhat:enterprise_linux:9::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::crb
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
reference_id cpe:/a:redhat:insights_proxy:1.5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_distributed_tracing:3.6::el8
reference_id cpe:/a:redhat:openshift_distributed_tracing:3.6::el8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_distributed_tracing:3.6::el8
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
reference_id cpe:/a:redhat:rhel_eus:9.4::crb
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::crb
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
reference_id cpe:/o:redhat:rhel_aus:8.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.2::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
reference_id cpe:/o:redhat:rhel_aus:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.4::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
reference_id cpe:/o:redhat:rhel_aus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_aus:8.6::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.6::baseos
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_id cpe:/o:redhat:rhel_e4s:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:8.8::baseos
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.0::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.0::baseos
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_id cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus_long_life:8.4::baseos
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
reference_id cpe:/o:redhat:rhel_tus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.6::baseos
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos
reference_id cpe:/o:redhat:rhel_tus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_tus:8.8::baseos
35
reference_url https://access.redhat.com/security/cve/CVE-2025-4373
reference_id CVE-2025-4373
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T15:09:21Z/
url https://access.redhat.com/security/cve/CVE-2025-4373
36
reference_url https://access.redhat.com/errata/RHSA-2025:10855
reference_id RHSA-2025:10855
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T15:09:21Z/
url https://access.redhat.com/errata/RHSA-2025:10855
37
reference_url https://access.redhat.com/errata/RHSA-2025:11140
reference_id RHSA-2025:11140
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T15:09:21Z/
url https://access.redhat.com/errata/RHSA-2025:11140
38
reference_url https://access.redhat.com/errata/RHSA-2025:11327
reference_id RHSA-2025:11327
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T15:09:21Z/
url https://access.redhat.com/errata/RHSA-2025:11327
39
reference_url https://access.redhat.com/errata/RHSA-2025:11373
reference_id RHSA-2025:11373
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T15:09:21Z/
url https://access.redhat.com/errata/RHSA-2025:11373
40
reference_url https://access.redhat.com/errata/RHSA-2025:11374
reference_id RHSA-2025:11374
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T15:09:21Z/
url https://access.redhat.com/errata/RHSA-2025:11374
41
reference_url https://access.redhat.com/errata/RHSA-2025:11662
reference_id RHSA-2025:11662
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T15:09:21Z/
url https://access.redhat.com/errata/RHSA-2025:11662
42
reference_url https://access.redhat.com/errata/RHSA-2025:12275
reference_id RHSA-2025:12275
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T15:09:21Z/
url https://access.redhat.com/errata/RHSA-2025:12275
43
reference_url https://access.redhat.com/errata/RHSA-2025:13335
reference_id RHSA-2025:13335
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T15:09:21Z/
url https://access.redhat.com/errata/RHSA-2025:13335
44
reference_url https://access.redhat.com/errata/RHSA-2025:14988
reference_id RHSA-2025:14988
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T15:09:21Z/
url https://access.redhat.com/errata/RHSA-2025:14988
45
reference_url https://access.redhat.com/errata/RHSA-2025:14989
reference_id RHSA-2025:14989
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T15:09:21Z/
url https://access.redhat.com/errata/RHSA-2025:14989
46
reference_url https://access.redhat.com/errata/RHSA-2025:14990
reference_id RHSA-2025:14990
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T15:09:21Z/
url https://access.redhat.com/errata/RHSA-2025:14990
47
reference_url https://access.redhat.com/errata/RHSA-2025:14991
reference_id RHSA-2025:14991
reference_type
scores
0
value 4.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T15:09:21Z/
url https://access.redhat.com/errata/RHSA-2025:14991
48
reference_url https://usn.ubuntu.com/7532-1/
reference_id USN-7532-1
reference_type
scores
url https://usn.ubuntu.com/7532-1/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u7%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.84.1-3?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.1-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.1-3%3Fdistro=trixie
5
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
6
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2025-4373
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cgcb-brxv-mqef
12
url VCID-cs49-wfxj-j3ba
vulnerability_id VCID-cs49-wfxj-j3ba
summary
PCRE is vulnerable to multiple buffer overflow and memory corruption
    vulnerabilities, possibly leading to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1661.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1661.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1661
reference_id
reference_type
scores
0
value 0.02034
scoring_system epss
scoring_elements 0.83744
published_at 2026-04-01T12:55:00Z
1
value 0.02034
scoring_system epss
scoring_elements 0.83758
published_at 2026-04-02T12:55:00Z
2
value 0.02034
scoring_system epss
scoring_elements 0.83772
published_at 2026-04-04T12:55:00Z
3
value 0.02034
scoring_system epss
scoring_elements 0.83775
published_at 2026-04-07T12:55:00Z
4
value 0.02034
scoring_system epss
scoring_elements 0.83799
published_at 2026-04-08T12:55:00Z
5
value 0.02034
scoring_system epss
scoring_elements 0.83805
published_at 2026-04-09T12:55:00Z
6
value 0.02034
scoring_system epss
scoring_elements 0.83821
published_at 2026-04-11T12:55:00Z
7
value 0.02034
scoring_system epss
scoring_elements 0.83815
published_at 2026-04-12T12:55:00Z
8
value 0.02034
scoring_system epss
scoring_elements 0.8381
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1661
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1661
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=392931
reference_id 392931
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=392931
4
reference_url https://security.gentoo.org/glsa/200711-30
reference_id GLSA-200711-30
reference_type
scores
url https://security.gentoo.org/glsa/200711-30
5
reference_url https://usn.ubuntu.com/547-1/
reference_id USN-547-1
reference_type
scores
url https://usn.ubuntu.com/547-1/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.14.3-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.14.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.14.3-1%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2007-1661
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cs49-wfxj-j3ba
13
url VCID-cy7v-dhum-gfgk
vulnerability_id VCID-cy7v-dhum-gfgk
summary
Uncontrolled Resource Consumption
A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32636.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32636.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32636
reference_id
reference_type
scores
0
value 0.00165
scoring_system epss
scoring_elements 0.37613
published_at 2026-04-02T12:55:00Z
1
value 0.00165
scoring_system epss
scoring_elements 0.37533
published_at 2026-04-13T12:55:00Z
2
value 0.00165
scoring_system epss
scoring_elements 0.37636
published_at 2026-04-04T12:55:00Z
3
value 0.00165
scoring_system epss
scoring_elements 0.37515
published_at 2026-04-07T12:55:00Z
4
value 0.00165
scoring_system epss
scoring_elements 0.37566
published_at 2026-04-08T12:55:00Z
5
value 0.00165
scoring_system epss
scoring_elements 0.37579
published_at 2026-04-09T12:55:00Z
6
value 0.00165
scoring_system epss
scoring_elements 0.37593
published_at 2026-04-11T12:55:00Z
7
value 0.00165
scoring_system epss
scoring_elements 0.37559
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32636
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://gitlab.gnome.org/GNOME/glib/-/issues/2841
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T17:51:57Z/
url https://gitlab.gnome.org/GNOME/glib/-/issues/2841
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2211833
reference_id 2211833
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2211833
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-32636
reference_id CVE-2023-32636
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-32636
6
reference_url https://security.netapp.com/advisory/ntap-20231110-0002/
reference_id ntap-20231110-0002
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T17:51:57Z/
url https://security.netapp.com/advisory/ntap-20231110-0002/
7
reference_url https://access.redhat.com/errata/RHSA-2024:2528
reference_id RHSA-2024:2528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2528
8
reference_url https://usn.ubuntu.com/6165-1/
reference_id USN-6165-1
reference_type
scores
url https://usn.ubuntu.com/6165-1/
9
reference_url https://usn.ubuntu.com/6165-2/
reference_id USN-6165-2
reference_type
scores
url https://usn.ubuntu.com/6165-2/
fixed_packages
0
url pkg:deb/debian/glib2.0@0?distro=trixie
purl pkg:deb/debian/glib2.0@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@0%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2023-32636
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cy7v-dhum-gfgk
14
url VCID-dpz7-pg2m-67hv
vulnerability_id VCID-dpz7-pg2m-67hv
summary
Out-of-bounds Write
A flaw was found in GLib. The GVariant deserialization code is vulnerable to a heap buffer overflow introduced by the fix for CVE-2023-32665. This bug does not affect any released version of GLib, but does affect GLib distributors who followed the guidance of GLib developers to backport the initial fix for CVE-2023-32665.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32643.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32643.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32643
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.13604
published_at 2026-04-04T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13542
published_at 2026-04-02T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13687
published_at 2026-04-13T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13672
published_at 2026-04-07T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13755
published_at 2026-04-08T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13805
published_at 2026-04-09T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13774
published_at 2026-04-11T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13737
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32643
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://gitlab.gnome.org/GNOME/glib/-/issues/2840
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-14T17:30:47Z/
url https://gitlab.gnome.org/GNOME/glib/-/issues/2840
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2211832
reference_id 2211832
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2211832
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-32643
reference_id CVE-2023-32643
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-32643
6
reference_url https://security.netapp.com/advisory/ntap-20240426-0005/
reference_id ntap-20240426-0005
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-14T17:30:47Z/
url https://security.netapp.com/advisory/ntap-20240426-0005/
7
reference_url https://usn.ubuntu.com/6165-1/
reference_id USN-6165-1
reference_type
scores
url https://usn.ubuntu.com/6165-1/
8
reference_url https://usn.ubuntu.com/6165-2/
reference_id USN-6165-2
reference_type
scores
url https://usn.ubuntu.com/6165-2/
fixed_packages
0
url pkg:deb/debian/glib2.0@0?distro=trixie
purl pkg:deb/debian/glib2.0@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@0%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2023-32643
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dpz7-pg2m-67hv
15
url VCID-dqaf-8bt4-e7b2
vulnerability_id VCID-dqaf-8bt4-e7b2
summary
Multiple vulnerabilities have been identified, the worst of which allow
    arbitrary code execution on a user's system via a malicious Flash file.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4768.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4768.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4768
reference_id
reference_type
scores
0
value 0.09602
scoring_system epss
scoring_elements 0.92852
published_at 2026-04-01T12:55:00Z
1
value 0.09602
scoring_system epss
scoring_elements 0.9286
published_at 2026-04-02T12:55:00Z
2
value 0.09602
scoring_system epss
scoring_elements 0.92863
published_at 2026-04-04T12:55:00Z
3
value 0.09602
scoring_system epss
scoring_elements 0.92861
published_at 2026-04-07T12:55:00Z
4
value 0.09602
scoring_system epss
scoring_elements 0.92869
published_at 2026-04-08T12:55:00Z
5
value 0.09602
scoring_system epss
scoring_elements 0.92873
published_at 2026-04-09T12:55:00Z
6
value 0.09602
scoring_system epss
scoring_elements 0.92878
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4768
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4768
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4768
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=392911
reference_id 392911
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=392911
4
reference_url https://security.gentoo.org/glsa/200711-30
reference_id GLSA-200711-30
reference_type
scores
url https://security.gentoo.org/glsa/200711-30
5
reference_url https://security.gentoo.org/glsa/200801-07
reference_id GLSA-200801-07
reference_type
scores
url https://security.gentoo.org/glsa/200801-07
6
reference_url https://access.redhat.com/errata/RHSA-2007:1126
reference_id RHSA-2007:1126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1126
7
reference_url https://usn.ubuntu.com/547-1/
reference_id USN-547-1
reference_type
scores
url https://usn.ubuntu.com/547-1/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.14.3-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.14.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.14.3-1%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2007-4768
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dqaf-8bt4-e7b2
16
url VCID-dsah-jpwg-yfez
vulnerability_id VCID-dsah-jpwg-yfez
summary glib: buffer overflow in set_connect_msg()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-52533.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-52533.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-52533
reference_id
reference_type
scores
0
value 0.03091
scoring_system epss
scoring_elements 0.86789
published_at 2026-04-13T12:55:00Z
1
value 0.03091
scoring_system epss
scoring_elements 0.86738
published_at 2026-04-02T12:55:00Z
2
value 0.03091
scoring_system epss
scoring_elements 0.86757
published_at 2026-04-04T12:55:00Z
3
value 0.03091
scoring_system epss
scoring_elements 0.86756
published_at 2026-04-07T12:55:00Z
4
value 0.03091
scoring_system epss
scoring_elements 0.86775
published_at 2026-04-08T12:55:00Z
5
value 0.03091
scoring_system epss
scoring_elements 0.86784
published_at 2026-04-09T12:55:00Z
6
value 0.03091
scoring_system epss
scoring_elements 0.86797
published_at 2026-04-11T12:55:00Z
7
value 0.03091
scoring_system epss
scoring_elements 0.86794
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-52533
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52533
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087419
reference_id 1087419
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1087419
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2325340
reference_id 2325340
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2325340
6
reference_url https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.1
reference_id 2.82.1
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-12T15:46:58Z/
url https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.1
7
reference_url https://gitlab.gnome.org/GNOME/glib/-/issues/3461
reference_id 3461
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-12T15:46:58Z/
url https://gitlab.gnome.org/GNOME/glib/-/issues/3461
8
reference_url https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home
reference_id home
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-12T15:46:58Z/
url https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home
9
reference_url https://access.redhat.com/errata/RHSA-2025:0936
reference_id RHSA-2025:0936
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0936
10
reference_url https://access.redhat.com/errata/RHSA-2025:10855
reference_id RHSA-2025:10855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10855
11
reference_url https://access.redhat.com/errata/RHSA-2025:11140
reference_id RHSA-2025:11140
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:11140
12
reference_url https://access.redhat.com/errata/RHSA-2025:11327
reference_id RHSA-2025:11327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:11327
13
reference_url https://access.redhat.com/errata/RHSA-2025:11373
reference_id RHSA-2025:11373
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:11373
14
reference_url https://access.redhat.com/errata/RHSA-2025:11374
reference_id RHSA-2025:11374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:11374
15
reference_url https://access.redhat.com/errata/RHSA-2025:11662
reference_id RHSA-2025:11662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:11662
16
reference_url https://access.redhat.com/errata/RHSA-2025:12275
reference_id RHSA-2025:12275
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:12275
17
reference_url https://access.redhat.com/errata/RHSA-2025:13335
reference_id RHSA-2025:13335
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13335
18
reference_url https://access.redhat.com/errata/RHSA-2025:14988
reference_id RHSA-2025:14988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14988
19
reference_url https://access.redhat.com/errata/RHSA-2025:14989
reference_id RHSA-2025:14989
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14989
20
reference_url https://access.redhat.com/errata/RHSA-2025:14990
reference_id RHSA-2025:14990
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14990
21
reference_url https://access.redhat.com/errata/RHSA-2025:14991
reference_id RHSA-2025:14991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14991
22
reference_url https://usn.ubuntu.com/7114-1/
reference_id USN-7114-1
reference_type
scores
url https://usn.ubuntu.com/7114-1/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.82.1-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.82.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.82.1-1%3Fdistro=trixie
5
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
6
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2024-52533
risk_score 3.1
exploitability 0.5
weighted_severity 6.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dsah-jpwg-yfez
17
url VCID-ezwm-38cx-tfct
vulnerability_id VCID-ezwm-38cx-tfct
summary glib: g_socket_client_connected_callback in gio/gsocketclient.c allows to cause denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9633.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9633.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9633
reference_id
reference_type
scores
0
value 0.00654
scoring_system epss
scoring_elements 0.70867
published_at 2026-04-01T12:55:00Z
1
value 0.00654
scoring_system epss
scoring_elements 0.70924
published_at 2026-04-13T12:55:00Z
2
value 0.00654
scoring_system epss
scoring_elements 0.70932
published_at 2026-04-09T12:55:00Z
3
value 0.00654
scoring_system epss
scoring_elements 0.70955
published_at 2026-04-11T12:55:00Z
4
value 0.00654
scoring_system epss
scoring_elements 0.7094
published_at 2026-04-12T12:55:00Z
5
value 0.00654
scoring_system epss
scoring_elements 0.70881
published_at 2026-04-02T12:55:00Z
6
value 0.00654
scoring_system epss
scoring_elements 0.70899
published_at 2026-04-04T12:55:00Z
7
value 0.00654
scoring_system epss
scoring_elements 0.70874
published_at 2026-04-07T12:55:00Z
8
value 0.00654
scoring_system epss
scoring_elements 0.70917
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9633
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://gitlab.gnome.org/GNOME/glib/issues/1649
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/glib/issues/1649
4
reference_url http://www.securityfocus.com/bid/107391
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107391
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1687805
reference_id 1687805
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1687805
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:glib:2.59.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:glib:2.59.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:glib:2.59.2:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9633
reference_id CVE-2019-9633
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-9633
fixed_packages
0
url pkg:deb/debian/glib2.0@0?distro=trixie
purl pkg:deb/debian/glib2.0@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@0%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2019-9633
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ezwm-38cx-tfct
18
url VCID-gchd-ewt9-17dk
vulnerability_id VCID-gchd-ewt9-17dk
summary glib: GLib: Denial of Service via Integer Overflow in g_buffered_input_stream_peek()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0988.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0988.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0988
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.21001
published_at 2026-04-13T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.2117
published_at 2026-04-02T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.20938
published_at 2026-04-07T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.21019
published_at 2026-04-08T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.21079
published_at 2026-04-09T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.21096
published_at 2026-04-11T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.21053
published_at 2026-04-12T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.21225
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0988
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0988
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125752
reference_id 1125752
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125752
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429886
reference_id 2429886
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T14:25:32Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2429886
6
reference_url https://gitlab.gnome.org/GNOME/glib/-/issues/3851
reference_id 3851
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T14:25:32Z/
url https://gitlab.gnome.org/GNOME/glib/-/issues/3851
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
reference_id cpe:/a:redhat:hummingbird:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
13
reference_url https://access.redhat.com/security/cve/CVE-2026-0988
reference_id CVE-2026-0988
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T14:25:32Z/
url https://access.redhat.com/security/cve/CVE-2026-0988
14
reference_url https://usn.ubuntu.com/7971-1/
reference_id USN-7971-1
reference_type
scores
url https://usn.ubuntu.com/7971-1/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u8%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.86.3-5?distro=trixie
purl pkg:deb/debian/glib2.0@2.86.3-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.86.3-5%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2026-0988
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gchd-ewt9-17dk
19
url VCID-gkef-z3kc-tua8
vulnerability_id VCID-gkef-z3kc-tua8
summary
Multiple integer overflows might allow for the execution of arbitrary code
    when performing base64 conversion.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00014.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00014.html
1
reference_url http://lists.vmware.com/pipermail/security-announce/2010/000082.html
reference_id
reference_type
scores
url http://lists.vmware.com/pipermail/security-announce/2010/000082.html
2
reference_url http://ocert.org/patches/2008-015/glib-CVE-2008-4316.diff
reference_id
reference_type
scores
url http://ocert.org/patches/2008-015/glib-CVE-2008-4316.diff
3
reference_url http://openwall.com/lists/oss-security/2009/03/12/2
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2009/03/12/2
4
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4316.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4316.json
5
reference_url https://api.first.org/data/v1/epss?cve=CVE-2008-4316
reference_id
reference_type
scores
0
value 0.00161
scoring_system epss
scoring_elements 0.36978
published_at 2026-04-13T12:55:00Z
1
value 0.00161
scoring_system epss
scoring_elements 0.36934
published_at 2026-04-01T12:55:00Z
2
value 0.00161
scoring_system epss
scoring_elements 0.37105
published_at 2026-04-02T12:55:00Z
3
value 0.00161
scoring_system epss
scoring_elements 0.37137
published_at 2026-04-04T12:55:00Z
4
value 0.00161
scoring_system epss
scoring_elements 0.36965
published_at 2026-04-07T12:55:00Z
5
value 0.00161
scoring_system epss
scoring_elements 0.37016
published_at 2026-04-08T12:55:00Z
6
value 0.00161
scoring_system epss
scoring_elements 0.37029
published_at 2026-04-09T12:55:00Z
7
value 0.00161
scoring_system epss
scoring_elements 0.37038
published_at 2026-04-11T12:55:00Z
8
value 0.00161
scoring_system epss
scoring_elements 0.37004
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2008-4316
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4316
7
reference_url http://secunia.com/advisories/34267
reference_id
reference_type
scores
url http://secunia.com/advisories/34267
8
reference_url http://secunia.com/advisories/34317
reference_id
reference_type
scores
url http://secunia.com/advisories/34317
9
reference_url http://secunia.com/advisories/34404
reference_id
reference_type
scores
url http://secunia.com/advisories/34404
10
reference_url http://secunia.com/advisories/34416
reference_id
reference_type
scores
url http://secunia.com/advisories/34416
11
reference_url http://secunia.com/advisories/34560
reference_id
reference_type
scores
url http://secunia.com/advisories/34560
12
reference_url http://secunia.com/advisories/34854
reference_id
reference_type
scores
url http://secunia.com/advisories/34854
13
reference_url http://secunia.com/advisories/34890
reference_id
reference_type
scores
url http://secunia.com/advisories/34890
14
reference_url http://secunia.com/advisories/38794
reference_id
reference_type
scores
url http://secunia.com/advisories/38794
15
reference_url http://secunia.com/advisories/38833
reference_id
reference_type
scores
url http://secunia.com/advisories/38833
16
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/49272
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/49272
17
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11401
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11401
18
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8360
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8360
19
reference_url http://svn.gnome.org/viewvc/glib?view=revision&revision=7973
reference_id
reference_type
scores
url http://svn.gnome.org/viewvc/glib?view=revision&revision=7973
20
reference_url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg01113.html
reference_id
reference_type
scores
url https://www.redhat.com/archives/fedora-package-announce/2009-March/msg01113.html
21
reference_url http://wiki.rpath.com/Advisories:rPSA-2009-0045
reference_id
reference_type
scores
url http://wiki.rpath.com/Advisories:rPSA-2009-0045
22
reference_url http://www.debian.org/security/2009/dsa-1747
reference_id
reference_type
scores
url http://www.debian.org/security/2009/dsa-1747
23
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2009:080
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2009:080
24
reference_url http://www.ocert.org/advisories/ocert-2008-015.html
reference_id
reference_type
scores
url http://www.ocert.org/advisories/ocert-2008-015.html
25
reference_url http://www.openwall.com/lists/oss-security/2009/03/16/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2009/03/16/2
26
reference_url http://www.redhat.com/archives/fedora-package-announce/2009-April/msg00744.html
reference_id
reference_type
scores
url http://www.redhat.com/archives/fedora-package-announce/2009-April/msg00744.html
27
reference_url http://www.redhat.com/support/errata/RHSA-2009-0336.html
reference_id
reference_type
scores
url http://www.redhat.com/support/errata/RHSA-2009-0336.html
28
reference_url http://www.securityfocus.com/archive/1/501712/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/501712/100/0/threaded
29
reference_url http://www.securityfocus.com/archive/1/501766/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/501766/100/0/threaded
30
reference_url http://www.securityfocus.com/bid/34100
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/34100
31
reference_url http://www.securitytracker.com/id?1021884
reference_id
reference_type
scores
url http://www.securitytracker.com/id?1021884
32
reference_url http://www.ubuntu.com/usn/usn-738-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/usn-738-1
33
reference_url http://www.vupen.com/english/advisories/2010/0528
reference_id
reference_type
scores
url http://www.vupen.com/english/advisories/2010/0528
34
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=474770
reference_id 474770
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=474770
35
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=520046
reference_id 520046
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=520046
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:glib:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:glib:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:glib:*:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:glib:2.14.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:glib:2.14.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:glib:2.14.5:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:glib:2.14.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:glib:2.14.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:glib:2.14.6:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:glib:2.16.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:glib:2.16.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:glib:2.16.3:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:glib:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:glib:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:glib:2.2.1:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/detail/CVE-2008-4316
reference_id CVE-2008-4316
reference_type
scores
0
value 4.6
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2008-4316
42
reference_url https://security.gentoo.org/glsa/200904-02
reference_id GLSA-200904-02
reference_type
scores
url https://security.gentoo.org/glsa/200904-02
43
reference_url https://access.redhat.com/errata/RHSA-2009:0336
reference_id RHSA-2009:0336
reference_type
scores
url https://access.redhat.com/errata/RHSA-2009:0336
44
reference_url https://usn.ubuntu.com/738-1/
reference_id USN-738-1
reference_type
scores
url https://usn.ubuntu.com/738-1/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.20.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.20.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.20.0-1%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2008-4316
risk_score 2.0
exploitability 0.5
weighted_severity 4.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gkef-z3kc-tua8
20
url VCID-gwaz-f5mw-j7cb
vulnerability_id VCID-gwaz-f5mw-j7cb
summary Glib: Glib: Local denial of service via buffer underflow in content type parsing
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1485.json
reference_id
reference_type
scores
0
value 2.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1485.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1485
reference_id
reference_type
scores
0
value 5e-05
scoring_system epss
scoring_elements 0.00254
published_at 2026-04-04T12:55:00Z
1
value 5e-05
scoring_system epss
scoring_elements 0.00253
published_at 2026-04-02T12:55:00Z
2
value 6e-05
scoring_system epss
scoring_elements 0.00336
published_at 2026-04-13T12:55:00Z
3
value 6e-05
scoring_system epss
scoring_elements 0.00345
published_at 2026-04-07T12:55:00Z
4
value 6e-05
scoring_system epss
scoring_elements 0.00342
published_at 2026-04-09T12:55:00Z
5
value 6e-05
scoring_system epss
scoring_elements 0.0034
published_at 2026-04-11T12:55:00Z
6
value 6e-05
scoring_system epss
scoring_elements 0.00339
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1485
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1485
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126550
reference_id 1126550
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126550
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2433325
reference_id 2433325
reference_type
scores
0
value 2.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T14:39:59Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2433325
6
reference_url https://gitlab.gnome.org/GNOME/glib/-/issues/3871
reference_id 3871
reference_type
scores
0
value 2.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T14:39:59Z/
url https://gitlab.gnome.org/GNOME/glib/-/issues/3871
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
12
reference_url https://access.redhat.com/security/cve/CVE-2026-1485
reference_id CVE-2026-1485
reference_type
scores
0
value 2.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T14:39:59Z/
url https://access.redhat.com/security/cve/CVE-2026-1485
13
reference_url https://usn.ubuntu.com/8017-1/
reference_id USN-8017-1
reference_type
scores
url https://usn.ubuntu.com/8017-1/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u8%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.86.3-5?distro=trixie
purl pkg:deb/debian/glib2.0@2.86.3-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.86.3-5%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2026-1485
risk_score 1.2
exploitability 0.5
weighted_severity 2.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gwaz-f5mw-j7cb
21
url VCID-h7kh-2qm2-1fgu
vulnerability_id VCID-h7kh-2qm2-1fgu
summary glib: GLib: Buffer underflow in GVariant parser leads to heap corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14087.json
reference_id
reference_type
scores
0
value 5.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14087.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14087
reference_id
reference_type
scores
0
value 0.00232
scoring_system epss
scoring_elements 0.46043
published_at 2026-04-08T12:55:00Z
1
value 0.00232
scoring_system epss
scoring_elements 0.46039
published_at 2026-04-04T12:55:00Z
2
value 0.00232
scoring_system epss
scoring_elements 0.45987
published_at 2026-04-07T12:55:00Z
3
value 0.00232
scoring_system epss
scoring_elements 0.46018
published_at 2026-04-02T12:55:00Z
4
value 0.00232
scoring_system epss
scoring_elements 0.4604
published_at 2026-04-09T12:55:00Z
5
value 0.00284
scoring_system epss
scoring_elements 0.51847
published_at 2026-04-13T12:55:00Z
6
value 0.00284
scoring_system epss
scoring_elements 0.51882
published_at 2026-04-11T12:55:00Z
7
value 0.00284
scoring_system epss
scoring_elements 0.51862
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14087
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14087
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14087
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1122347
reference_id 1122347
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1122347
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2419093
reference_id 2419093
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-10T14:46:20Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2419093
6
reference_url https://gitlab.gnome.org/GNOME/glib/-/issues/3834
reference_id 3834
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-10T14:46:20Z/
url https://gitlab.gnome.org/GNOME/glib/-/issues/3834
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
reference_id cpe:/a:redhat:hummingbird:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
13
reference_url https://access.redhat.com/security/cve/CVE-2025-14087
reference_id CVE-2025-14087
reference_type
scores
0
value 5.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-10T14:46:20Z/
url https://access.redhat.com/security/cve/CVE-2025-14087
14
reference_url https://usn.ubuntu.com/7942-1/
reference_id USN-7942-1
reference_type
scores
url https://usn.ubuntu.com/7942-1/
15
reference_url https://usn.ubuntu.com/7942-2/
reference_id USN-7942-2
reference_type
scores
url https://usn.ubuntu.com/7942-2/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u7%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.86.3-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.86.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.86.3-1%3Fdistro=trixie
5
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2025-14087
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h7kh-2qm2-1fgu
22
url VCID-j5ez-ccu3-j3c6
vulnerability_id VCID-j5ez-ccu3-j3c6
summary glib2: folder | symlink permissions change after copy via nautilus
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3289.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3289.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-3289
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22285
published_at 2026-04-07T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22451
published_at 2026-04-02T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22497
published_at 2026-04-04T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22367
published_at 2026-04-08T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22422
published_at 2026-04-09T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22443
published_at 2026-04-11T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22402
published_at 2026-04-12T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22345
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-3289
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3289
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=524829
reference_id 524829
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=524829
4
reference_url https://usn.ubuntu.com/841-1/
reference_id USN-841-1
reference_type
scores
url https://usn.ubuntu.com/841-1/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.22.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.22.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.22.0-1%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2009-3289
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j5ez-ccu3-j3c6
23
url VCID-jkfs-7tug-5beu
vulnerability_id VCID-jkfs-7tug-5beu
summary glib2: NULL pointer dereference in g_markup_parse_context_end_parse() function in gmarkup.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16428.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16428.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16428
reference_id
reference_type
scores
0
value 0.0065
scoring_system epss
scoring_elements 0.70753
published_at 2026-04-01T12:55:00Z
1
value 0.0065
scoring_system epss
scoring_elements 0.70768
published_at 2026-04-02T12:55:00Z
2
value 0.0065
scoring_system epss
scoring_elements 0.70786
published_at 2026-04-04T12:55:00Z
3
value 0.0065
scoring_system epss
scoring_elements 0.70762
published_at 2026-04-07T12:55:00Z
4
value 0.0065
scoring_system epss
scoring_elements 0.70806
published_at 2026-04-08T12:55:00Z
5
value 0.0065
scoring_system epss
scoring_elements 0.70822
published_at 2026-04-09T12:55:00Z
6
value 0.0065
scoring_system epss
scoring_elements 0.70845
published_at 2026-04-11T12:55:00Z
7
value 0.0065
scoring_system epss
scoring_elements 0.70829
published_at 2026-04-12T12:55:00Z
8
value 0.0065
scoring_system epss
scoring_elements 0.70814
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16428
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16428
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1626145
reference_id 1626145
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1626145
5
reference_url https://usn.ubuntu.com/3767-1/
reference_id USN-3767-1
reference_type
scores
url https://usn.ubuntu.com/3767-1/
6
reference_url https://usn.ubuntu.com/3767-2/
reference_id USN-3767-2
reference_type
scores
url https://usn.ubuntu.com/3767-2/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.58.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.58.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.58.0-1%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2018-16428
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jkfs-7tug-5beu
24
url VCID-khtv-um6m-pkad
vulnerability_id VCID-khtv-um6m-pkad
summary glib2: Possible privilege escalation thourgh pkexec and aliases
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3800.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3800.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3800
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.1965
published_at 2026-04-01T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19788
published_at 2026-04-02T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.1984
published_at 2026-04-04T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19562
published_at 2026-04-07T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19642
published_at 2026-04-08T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19694
published_at 2026-04-09T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19698
published_at 2026-04-11T12:55:00Z
7
value 0.00063
scoring_system epss
scoring_elements 0.19649
published_at 2026-04-12T12:55:00Z
8
value 0.00063
scoring_system epss
scoring_elements 0.19591
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3800
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3800
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3800
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.gnome.org/GNOME/glib/-/commit/3529bb4450a51995
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/glib/-/commit/3529bb4450a51995
5
reference_url https://www.openwall.com/lists/oss-security/2017/06/23/8
reference_id
reference_type
scores
url https://www.openwall.com/lists/oss-security/2017/06/23/8
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1938284
reference_id 1938284
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1938284
7
reference_url https://access.redhat.com/security/cve/CVE-2021-3800
reference_id CVE-2021-3800
reference_type
scores
url https://access.redhat.com/security/cve/CVE-2021-3800
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-3800
reference_id CVE-2021-3800
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-3800
9
reference_url https://access.redhat.com/errata/RHSA-2021:4385
reference_id RHSA-2021:4385
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4385
10
reference_url https://usn.ubuntu.com/5189-1/
reference_id USN-5189-1
reference_type
scores
url https://usn.ubuntu.com/5189-1/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.64.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.64.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.64.0-1%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2021-3800
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-khtv-um6m-pkad
25
url VCID-mha6-j74w-wudp
vulnerability_id VCID-mha6-j74w-wudp
summary
PCRE is vulnerable to multiple buffer overflow and memory corruption
    vulnerabilities, possibly leading to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1662.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1662.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1662
reference_id
reference_type
scores
0
value 0.0407
scoring_system epss
scoring_elements 0.88488
published_at 2026-04-01T12:55:00Z
1
value 0.0407
scoring_system epss
scoring_elements 0.88496
published_at 2026-04-02T12:55:00Z
2
value 0.0407
scoring_system epss
scoring_elements 0.88512
published_at 2026-04-04T12:55:00Z
3
value 0.0407
scoring_system epss
scoring_elements 0.88516
published_at 2026-04-07T12:55:00Z
4
value 0.0407
scoring_system epss
scoring_elements 0.88534
published_at 2026-04-08T12:55:00Z
5
value 0.0407
scoring_system epss
scoring_elements 0.88539
published_at 2026-04-09T12:55:00Z
6
value 0.0407
scoring_system epss
scoring_elements 0.88551
published_at 2026-04-11T12:55:00Z
7
value 0.0407
scoring_system epss
scoring_elements 0.88543
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1662
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1662
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=392921
reference_id 392921
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=392921
4
reference_url https://security.gentoo.org/glsa/200711-30
reference_id GLSA-200711-30
reference_type
scores
url https://security.gentoo.org/glsa/200711-30
5
reference_url https://usn.ubuntu.com/547-1/
reference_id USN-547-1
reference_type
scores
url https://usn.ubuntu.com/547-1/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.14.3-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.14.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.14.3-1%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2007-1662
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mha6-j74w-wudp
26
url VCID-p6zn-nqaf-wfa7
vulnerability_id VCID-p6zn-nqaf-wfa7
summary glib2: insecure permissions for files and directories
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13012.json
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13012.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-13012
reference_id
reference_type
scores
0
value 0.00826
scoring_system epss
scoring_elements 0.74464
published_at 2026-04-13T12:55:00Z
1
value 0.00842
scoring_system epss
scoring_elements 0.74688
published_at 2026-04-01T12:55:00Z
2
value 0.00842
scoring_system epss
scoring_elements 0.74691
published_at 2026-04-07T12:55:00Z
3
value 0.00842
scoring_system epss
scoring_elements 0.74718
published_at 2026-04-04T12:55:00Z
4
value 0.00842
scoring_system epss
scoring_elements 0.74724
published_at 2026-04-08T12:55:00Z
5
value 0.00842
scoring_system epss
scoring_elements 0.74738
published_at 2026-04-09T12:55:00Z
6
value 0.00842
scoring_system epss
scoring_elements 0.74761
published_at 2026-04-11T12:55:00Z
7
value 0.00842
scoring_system epss
scoring_elements 0.7474
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-13012
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13012
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1728632
reference_id 1728632
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1728632
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931234
reference_id 931234
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931234
6
reference_url https://access.redhat.com/errata/RHSA-2021:1586
reference_id RHSA-2021:1586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1586
7
reference_url https://usn.ubuntu.com/4049-1/
reference_id USN-4049-1
reference_type
scores
url https://usn.ubuntu.com/4049-1/
8
reference_url https://usn.ubuntu.com/4049-2/
reference_id USN-4049-2
reference_type
scores
url https://usn.ubuntu.com/4049-2/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.60.5-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.60.5-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.60.5-1%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2019-13012
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p6zn-nqaf-wfa7
27
url VCID-r5t7-nkkv-skhg
vulnerability_id VCID-r5t7-nkkv-skhg
summary A vulnerability has been discovered in GLib, which can lead to privilege escalation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-34397.json
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-34397.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-34397
reference_id
reference_type
scores
0
value 0.0019
scoring_system epss
scoring_elements 0.40855
published_at 2026-04-13T12:55:00Z
1
value 0.0019
scoring_system epss
scoring_elements 0.40881
published_at 2026-04-02T12:55:00Z
2
value 0.0019
scoring_system epss
scoring_elements 0.40909
published_at 2026-04-11T12:55:00Z
3
value 0.0019
scoring_system epss
scoring_elements 0.40837
published_at 2026-04-07T12:55:00Z
4
value 0.0019
scoring_system epss
scoring_elements 0.40886
published_at 2026-04-08T12:55:00Z
5
value 0.0019
scoring_system epss
scoring_elements 0.40892
published_at 2026-04-09T12:55:00Z
6
value 0.0019
scoring_system epss
scoring_elements 0.40874
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-34397
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-34397
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2279632
reference_id 2279632
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2279632
5
reference_url https://gitlab.gnome.org/GNOME/glib/-/issues/3268
reference_id 3268
reference_type
scores
0
value 5.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-09T19:45:07Z/
url https://gitlab.gnome.org/GNOME/glib/-/issues/3268
6
reference_url https://www.openwall.com/lists/oss-security/2024/05/07/5
reference_id 5
reference_type
scores
0
value 5.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-09T19:45:07Z/
url https://www.openwall.com/lists/oss-security/2024/05/07/5
7
reference_url https://security.gentoo.org/glsa/202406-01
reference_id GLSA-202406-01
reference_type
scores
url https://security.gentoo.org/glsa/202406-01
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IRSFYAE5X23TNRWX7ZWEJOMISLCDSYNS/
reference_id IRSFYAE5X23TNRWX7ZWEJOMISLCDSYNS
reference_type
scores
0
value 5.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-09T19:45:07Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IRSFYAE5X23TNRWX7ZWEJOMISLCDSYNS/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LCDY3KA7G7D3DRXYTT46K6LFHS2KHWBH/
reference_id LCDY3KA7G7D3DRXYTT46K6LFHS2KHWBH
reference_type
scores
0
value 5.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-09T19:45:07Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LCDY3KA7G7D3DRXYTT46K6LFHS2KHWBH/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LL6HSJDXCXMLEIJBYV6CPOR4K2NTCTXW/
reference_id LL6HSJDXCXMLEIJBYV6CPOR4K2NTCTXW
reference_type
scores
0
value 5.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-09T19:45:07Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LL6HSJDXCXMLEIJBYV6CPOR4K2NTCTXW/
11
reference_url https://lists.debian.org/debian-lts-announce/2024/05/msg00008.html
reference_id msg00008.html
reference_type
scores
0
value 5.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-09T19:45:07Z/
url https://lists.debian.org/debian-lts-announce/2024/05/msg00008.html
12
reference_url https://security.netapp.com/advisory/ntap-20240531-0008/
reference_id ntap-20240531-0008
reference_type
scores
0
value 5.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-09T19:45:07Z/
url https://security.netapp.com/advisory/ntap-20240531-0008/
13
reference_url https://access.redhat.com/errata/RHSA-2024:10135
reference_id RHSA-2024:10135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10135
14
reference_url https://access.redhat.com/errata/RHSA-2024:11109
reference_id RHSA-2024:11109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11109
15
reference_url https://access.redhat.com/errata/RHSA-2024:6464
reference_id RHSA-2024:6464
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6464
16
reference_url https://access.redhat.com/errata/RHSA-2024:7213
reference_id RHSA-2024:7213
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7213
17
reference_url https://access.redhat.com/errata/RHSA-2024:7374
reference_id RHSA-2024:7374
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7374
18
reference_url https://access.redhat.com/errata/RHSA-2024:9442
reference_id RHSA-2024:9442
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9442
19
reference_url https://access.redhat.com/errata/RHSA-2025:10780
reference_id RHSA-2025:10780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10780
20
reference_url https://access.redhat.com/errata/RHSA-2025:11327
reference_id RHSA-2025:11327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:11327
21
reference_url https://access.redhat.com/errata/RHSA-2025:11662
reference_id RHSA-2025:11662
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:11662
22
reference_url https://access.redhat.com/errata/RHSA-2025:14988
reference_id RHSA-2025:14988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14988
23
reference_url https://access.redhat.com/errata/RHSA-2025:14989
reference_id RHSA-2025:14989
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14989
24
reference_url https://access.redhat.com/errata/RHSA-2025:14990
reference_id RHSA-2025:14990
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14990
25
reference_url https://access.redhat.com/errata/RHSA-2025:14991
reference_id RHSA-2025:14991
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14991
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UNFJHISR4O6VFOHBFWH5I5WWMG37H63A/
reference_id UNFJHISR4O6VFOHBFWH5I5WWMG37H63A
reference_type
scores
0
value 5.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-09T19:45:07Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UNFJHISR4O6VFOHBFWH5I5WWMG37H63A/
27
reference_url https://usn.ubuntu.com/6768-1/
reference_id USN-6768-1
reference_type
scores
url https://usn.ubuntu.com/6768-1/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.80.0-10?distro=trixie
purl pkg:deb/debian/glib2.0@2.80.0-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.80.0-10%3Fdistro=trixie
5
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
6
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2024-34397
risk_score 2.4
exploitability 0.5
weighted_severity 4.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r5t7-nkkv-skhg
28
url VCID-re78-z26g-ffen
vulnerability_id VCID-re78-z26g-ffen
summary glib: Buffer Under-read on GLib through glib/gfileutils.c via get_tmp_file()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-7039.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-7039.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-7039
reference_id
reference_type
scores
0
value 0.00045
scoring_system epss
scoring_elements 0.13708
published_at 2026-04-13T12:55:00Z
1
value 0.00045
scoring_system epss
scoring_elements 0.13827
published_at 2026-04-09T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13794
published_at 2026-04-11T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13757
published_at 2026-04-12T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14447
published_at 2026-04-07T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14536
published_at 2026-04-08T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14637
published_at 2026-04-04T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14567
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-7039
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7039
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7039
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110640
reference_id 1110640
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110640
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2392423
reference_id 2392423
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-03T13:47:11Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2392423
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2025-7039
reference_id CVE-2025-7039
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-03T13:47:11Z/
url https://access.redhat.com/security/cve/CVE-2025-7039
12
reference_url https://usn.ubuntu.com/7942-1/
reference_id USN-7942-1
reference_type
scores
url https://usn.ubuntu.com/7942-1/
13
reference_url https://usn.ubuntu.com/7942-2/
reference_id USN-7942-2
reference_type
scores
url https://usn.ubuntu.com/7942-2/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u7%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u7?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u7%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.84.4-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-1%3Fdistro=trixie
5
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u1?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u1%3Fdistro=trixie
6
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
7
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2025-7039
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-re78-z26g-ffen
29
url VCID-s4xn-z1py-9bbs
vulnerability_id VCID-s4xn-z1py-9bbs
summary
A vulnerability has been found in D-Bus which allows local
    attackers to gain escalated privileges.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00009.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00015.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00000.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2012-1261.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2012-1261.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3524.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3524.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-3524
reference_id
reference_type
scores
0
value 0.52378
scoring_system epss
scoring_elements 0.9793
published_at 2026-04-13T12:55:00Z
1
value 0.52378
scoring_system epss
scoring_elements 0.97907
published_at 2026-04-01T12:55:00Z
2
value 0.52378
scoring_system epss
scoring_elements 0.97912
published_at 2026-04-02T12:55:00Z
3
value 0.52378
scoring_system epss
scoring_elements 0.97914
published_at 2026-04-04T12:55:00Z
4
value 0.52378
scoring_system epss
scoring_elements 0.97917
published_at 2026-04-07T12:55:00Z
5
value 0.52378
scoring_system epss
scoring_elements 0.97922
published_at 2026-04-08T12:55:00Z
6
value 0.52378
scoring_system epss
scoring_elements 0.97924
published_at 2026-04-09T12:55:00Z
7
value 0.52378
scoring_system epss
scoring_elements 0.97927
published_at 2026-04-11T12:55:00Z
8
value 0.52378
scoring_system epss
scoring_elements 0.97928
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-3524
7
reference_url https://bugs.freedesktop.org/show_bug.cgi?id=52202
reference_id
reference_type
scores
url https://bugs.freedesktop.org/show_bug.cgi?id=52202
8
reference_url https://bugzilla.novell.com/show_bug.cgi?id=697105
reference_id
reference_type
scores
url https://bugzilla.novell.com/show_bug.cgi?id=697105
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3524
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3524
10
reference_url http://secunia.com/advisories/50537
reference_id
reference_type
scores
url http://secunia.com/advisories/50537
11
reference_url http://secunia.com/advisories/50544
reference_id
reference_type
scores
url http://secunia.com/advisories/50544
12
reference_url http://secunia.com/advisories/50710
reference_id
reference_type
scores
url http://secunia.com/advisories/50710
13
reference_url http://stealth.openwall.net/null/dzug.c
reference_id
reference_type
scores
url http://stealth.openwall.net/null/dzug.c
14
reference_url http://www.exploit-db.com/exploits/21323
reference_id
reference_type
scores
url http://www.exploit-db.com/exploits/21323
15
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:070
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:070
16
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:083
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:083
17
reference_url http://www.openwall.com/lists/oss-security/2012/07/10/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/07/10/4
18
reference_url http://www.openwall.com/lists/oss-security/2012/07/26/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/07/26/1
19
reference_url http://www.openwall.com/lists/oss-security/2012/09/12/6
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/12/6
20
reference_url http://www.openwall.com/lists/oss-security/2012/09/14/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/14/2
21
reference_url http://www.openwall.com/lists/oss-security/2012/09/17/2
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2012/09/17/2
22
reference_url http://www.securityfocus.com/bid/55517
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/55517
23
reference_url http://www.ubuntu.com/usn/USN-1576-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1576-1
24
reference_url http://www.ubuntu.com/usn/USN-1576-2
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1576-2
25
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689070
reference_id 689070
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=689070
26
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=847402
reference_id 847402
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=847402
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:libdbus:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:*:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:libdbus:1.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.0:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:libdbus:1.5.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.10:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:libdbus:1.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.2:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:libdbus:1.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.4:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:libdbus:1.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.6:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:freedesktop:libdbus:1.5.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:freedesktop:libdbus:1.5.8:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-3524
reference_id CVE-2012-3524
reference_type
scores
0
value 6.9
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:C/I:C/A:C
url https://nvd.nist.gov/vuln/detail/CVE-2012-3524
35
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/21323.c
reference_id CVE-2012-3524;OSVDB-85480;CVE-2012-4425
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/21323.c
36
reference_url https://security.gentoo.org/glsa/201406-01
reference_id GLSA-201406-01
reference_type
scores
url https://security.gentoo.org/glsa/201406-01
37
reference_url https://access.redhat.com/errata/RHSA-2012:1261
reference_id RHSA-2012:1261
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:1261
38
reference_url https://usn.ubuntu.com/1576-1/
reference_id USN-1576-1
reference_type
scores
url https://usn.ubuntu.com/1576-1/
39
reference_url https://usn.ubuntu.com/1576-2/
reference_id USN-1576-2
reference_type
scores
url https://usn.ubuntu.com/1576-2/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.33.12%2Breally2.32.4-2?distro=trixie
purl pkg:deb/debian/glib2.0@2.33.12%2Breally2.32.4-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.33.12%252Breally2.32.4-2%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2012-3524
risk_score 10.0
exploitability 2.0
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s4xn-z1py-9bbs
30
url VCID-sue7-e3bs-tuep
vulnerability_id VCID-sue7-e3bs-tuep
summary pcre miscalculation of memory requirements for malformed Posix character class
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7225.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7225.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-7225
reference_id
reference_type
scores
0
value 0.01295
scoring_system epss
scoring_elements 0.79642
published_at 2026-04-01T12:55:00Z
1
value 0.01295
scoring_system epss
scoring_elements 0.79648
published_at 2026-04-02T12:55:00Z
2
value 0.01295
scoring_system epss
scoring_elements 0.7967
published_at 2026-04-04T12:55:00Z
3
value 0.01295
scoring_system epss
scoring_elements 0.79656
published_at 2026-04-07T12:55:00Z
4
value 0.01295
scoring_system epss
scoring_elements 0.79685
published_at 2026-04-08T12:55:00Z
5
value 0.01295
scoring_system epss
scoring_elements 0.79692
published_at 2026-04-09T12:55:00Z
6
value 0.01295
scoring_system epss
scoring_elements 0.79713
published_at 2026-04-11T12:55:00Z
7
value 0.01295
scoring_system epss
scoring_elements 0.79697
published_at 2026-04-12T12:55:00Z
8
value 0.01295
scoring_system epss
scoring_elements 0.7969
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-7225
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7225
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7225
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=384761
reference_id 384761
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=384761
4
reference_url https://access.redhat.com/errata/RHSA-2007:1059
reference_id RHSA-2007:1059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1059
5
reference_url https://access.redhat.com/errata/RHSA-2007:1068
reference_id RHSA-2007:1068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1068
fixed_packages
0
url pkg:deb/debian/glib2.0@2.14.3-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.14.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.14.3-1%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2006-7225
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sue7-e3bs-tuep
31
url VCID-sy5p-ju6m-vbgp
vulnerability_id VCID-sy5p-ju6m-vbgp
summary
PCRE is vulnerable to multiple buffer overflow and memory corruption
    vulnerabilities, possibly leading to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1660.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1660.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-1660
reference_id
reference_type
scores
0
value 0.05628
scoring_system epss
scoring_elements 0.903
published_at 2026-04-01T12:55:00Z
1
value 0.05628
scoring_system epss
scoring_elements 0.90303
published_at 2026-04-02T12:55:00Z
2
value 0.05628
scoring_system epss
scoring_elements 0.90315
published_at 2026-04-04T12:55:00Z
3
value 0.05628
scoring_system epss
scoring_elements 0.9032
published_at 2026-04-07T12:55:00Z
4
value 0.05628
scoring_system epss
scoring_elements 0.90334
published_at 2026-04-08T12:55:00Z
5
value 0.05628
scoring_system epss
scoring_elements 0.90341
published_at 2026-04-09T12:55:00Z
6
value 0.05628
scoring_system epss
scoring_elements 0.90349
published_at 2026-04-12T12:55:00Z
7
value 0.05628
scoring_system epss
scoring_elements 0.90342
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-1660
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1660
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1660
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=315881
reference_id 315881
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=315881
4
reference_url https://security.gentoo.org/glsa/200711-30
reference_id GLSA-200711-30
reference_type
scores
url https://security.gentoo.org/glsa/200711-30
5
reference_url https://access.redhat.com/errata/RHSA-2007:0967
reference_id RHSA-2007:0967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0967
6
reference_url https://access.redhat.com/errata/RHSA-2007:0968
reference_id RHSA-2007:0968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:0968
7
reference_url https://access.redhat.com/errata/RHSA-2007:1063
reference_id RHSA-2007:1063
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1063
8
reference_url https://access.redhat.com/errata/RHSA-2007:1065
reference_id RHSA-2007:1065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1065
9
reference_url https://access.redhat.com/errata/RHSA-2008:0546
reference_id RHSA-2008:0546
reference_type
scores
url https://access.redhat.com/errata/RHSA-2008:0546
10
reference_url https://usn.ubuntu.com/547-1/
reference_id USN-547-1
reference_type
scores
url https://usn.ubuntu.com/547-1/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.14.3-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.14.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.14.3-1%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2007-1660
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sy5p-ju6m-vbgp
32
url VCID-syjs-4vtj-4bcb
vulnerability_id VCID-syjs-4vtj-4bcb
summary
Multiple vulnerabilities have been found in GLib, the worst of
    which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27218.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-27218.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-27218
reference_id
reference_type
scores
0
value 0.05212
scoring_system epss
scoring_elements 0.89898
published_at 2026-04-01T12:55:00Z
1
value 0.05212
scoring_system epss
scoring_elements 0.89947
published_at 2026-04-12T12:55:00Z
2
value 0.05212
scoring_system epss
scoring_elements 0.89941
published_at 2026-04-13T12:55:00Z
3
value 0.05212
scoring_system epss
scoring_elements 0.89949
published_at 2026-04-11T12:55:00Z
4
value 0.05212
scoring_system epss
scoring_elements 0.89901
published_at 2026-04-02T12:55:00Z
5
value 0.05212
scoring_system epss
scoring_elements 0.89913
published_at 2026-04-04T12:55:00Z
6
value 0.05212
scoring_system epss
scoring_elements 0.89919
published_at 2026-04-07T12:55:00Z
7
value 0.05212
scoring_system epss
scoring_elements 0.89936
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-27218
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27218
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1942
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1942
5
reference_url https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1944
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1944
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1929847
reference_id 1929847
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1929847
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982779
reference_id 982779
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982779
8
reference_url https://security.archlinux.org/AVG-1575
reference_id AVG-1575
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1575
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-27218
reference_id CVE-2021-27218
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2021-27218
10
reference_url https://security.gentoo.org/glsa/202107-13
reference_id GLSA-202107-13
reference_type
scores
url https://security.gentoo.org/glsa/202107-13
11
reference_url https://access.redhat.com/errata/RHSA-2021:3058
reference_id RHSA-2021:3058
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3058
12
reference_url https://access.redhat.com/errata/RHSA-2021:4526
reference_id RHSA-2021:4526
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4526
13
reference_url https://usn.ubuntu.com/4759-1/
reference_id USN-4759-1
reference_type
scores
url https://usn.ubuntu.com/4759-1/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.66.7-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.7-1%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2021-27218
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-syjs-4vtj-4bcb
33
url VCID-t8h7-hah9-bkaw
vulnerability_id VCID-t8h7-hah9-bkaw
summary gvdb: use after free issue was fixed in gvdb_table_write_contents_async()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-25085.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-25085.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-25085
reference_id
reference_type
scores
0
value 0.00538
scoring_system epss
scoring_elements 0.67476
published_at 2026-04-01T12:55:00Z
1
value 0.00538
scoring_system epss
scoring_elements 0.67512
published_at 2026-04-02T12:55:00Z
2
value 0.00538
scoring_system epss
scoring_elements 0.67533
published_at 2026-04-04T12:55:00Z
3
value 0.00538
scoring_system epss
scoring_elements 0.67511
published_at 2026-04-07T12:55:00Z
4
value 0.00538
scoring_system epss
scoring_elements 0.67563
published_at 2026-04-08T12:55:00Z
5
value 0.00538
scoring_system epss
scoring_elements 0.67577
published_at 2026-04-09T12:55:00Z
6
value 0.00538
scoring_system epss
scoring_elements 0.67599
published_at 2026-04-11T12:55:00Z
7
value 0.00538
scoring_system epss
scoring_elements 0.67586
published_at 2026-04-12T12:55:00Z
8
value 0.00538
scoring_system epss
scoring_elements 0.67553
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-25085
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25085
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25085
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2156440
reference_id 2156440
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2156440
fixed_packages
0
url pkg:deb/debian/glib2.0@2.66.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.0-1%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2019-25085
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t8h7-hah9-bkaw
34
url VCID-tmff-7vrs-sqfx
vulnerability_id VCID-tmff-7vrs-sqfx
summary GNOME GLib before 2.65.3 has an integer overflow, that might lead to an out-of-bounds write, in g_option_group_add_entries. NOTE: the vendor's position is "Realistically this is not a security issue. The standard pattern is for callers to provide a static list of option entries in a fixed number of calls to g_option_group_add_entries()." The researcher states that this pattern is undocumented
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35457
reference_id
reference_type
scores
0
value 0.0019
scoring_system epss
scoring_elements 0.40773
published_at 2026-04-01T12:55:00Z
1
value 0.0019
scoring_system epss
scoring_elements 0.40857
published_at 2026-04-02T12:55:00Z
2
value 0.0019
scoring_system epss
scoring_elements 0.40884
published_at 2026-04-04T12:55:00Z
3
value 0.0019
scoring_system epss
scoring_elements 0.4081
published_at 2026-04-07T12:55:00Z
4
value 0.0019
scoring_system epss
scoring_elements 0.40858
published_at 2026-04-08T12:55:00Z
5
value 0.0019
scoring_system epss
scoring_elements 0.40865
published_at 2026-04-09T12:55:00Z
6
value 0.0019
scoring_system epss
scoring_elements 0.40883
published_at 2026-04-11T12:55:00Z
7
value 0.0019
scoring_system epss
scoring_elements 0.40848
published_at 2026-04-12T12:55:00Z
8
value 0.0019
scoring_system epss
scoring_elements 0.40829
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35457
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35457
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35457
2
reference_url https://gitlab.gnome.org/GNOME/glib/-/commit/63c5b62f0a984fac9a9700b12f54fe878e016a5d
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/glib/-/commit/63c5b62f0a984fac9a9700b12f54fe878e016a5d
3
reference_url https://gitlab.gnome.org/GNOME/glib/-/issues/2197
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/glib/-/issues/2197
4
reference_url https://gitlab.gnome.org/GNOME/glib/-/releases/2.65.3
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/glib/-/releases/2.65.3
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-35457
reference_id CVE-2020-35457
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2020-35457
fixed_packages
0
url pkg:deb/debian/glib2.0@2.66.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.0-1%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2020-35457
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tmff-7vrs-sqfx
35
url VCID-tzt9-dtt8-bkfm
vulnerability_id VCID-tzt9-dtt8-bkfm
summary
Deserialization of Untrusted Data
A flaw was found in GLib. GVariant deserialization is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32665.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32665.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32665
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17111
published_at 2026-04-13T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.1717
published_at 2026-04-12T12:55:00Z
2
value 0.00059
scoring_system epss
scoring_elements 0.18629
published_at 2026-04-09T12:55:00Z
3
value 0.00059
scoring_system epss
scoring_elements 0.18724
published_at 2026-04-02T12:55:00Z
4
value 0.00059
scoring_system epss
scoring_elements 0.18633
published_at 2026-04-11T12:55:00Z
5
value 0.00059
scoring_system epss
scoring_elements 0.18779
published_at 2026-04-04T12:55:00Z
6
value 0.00059
scoring_system epss
scoring_elements 0.18496
published_at 2026-04-07T12:55:00Z
7
value 0.00059
scoring_system epss
scoring_elements 0.18576
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32665
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2211827
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-11-27T17:04:41Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2211827
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32665
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://gitlab.gnome.org/GNOME/glib/-/issues/2121
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-11-27T17:04:41Z/
url https://gitlab.gnome.org/GNOME/glib/-/issues/2121
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
10
reference_url https://access.redhat.com/security/cve/CVE-2023-32665
reference_id CVE-2023-32665
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-11-27T17:04:41Z/
url https://access.redhat.com/security/cve/CVE-2023-32665
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-32665
reference_id CVE-2023-32665
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-32665
12
reference_url https://security.gentoo.org/glsa/202311-18
reference_id GLSA-202311-18
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-11-27T17:04:41Z/
url https://security.gentoo.org/glsa/202311-18
13
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00030.html
reference_id msg00030.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-11-27T17:04:41Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00030.html
14
reference_url https://security.netapp.com/advisory/ntap-20240426-0006/
reference_id ntap-20240426-0006
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2023-11-27T17:04:41Z/
url https://security.netapp.com/advisory/ntap-20240426-0006/
15
reference_url https://access.redhat.com/errata/RHSA-2023:6631
reference_id RHSA-2023:6631
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6631
16
reference_url https://access.redhat.com/errata/RHSA-2024:2528
reference_id RHSA-2024:2528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2528
17
reference_url https://usn.ubuntu.com/6165-1/
reference_id USN-6165-1
reference_type
scores
url https://usn.ubuntu.com/6165-1/
18
reference_url https://usn.ubuntu.com/6165-2/
reference_id USN-6165-2
reference_type
scores
url https://usn.ubuntu.com/6165-2/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.4-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.4-1%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
5
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2023-32665
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tzt9-dtt8-bkfm
36
url VCID-u5sb-ke8a-qkd2
vulnerability_id VCID-u5sb-ke8a-qkd2
summary Glib: Integer Overflow Leading to Buffer Underflow and Out-of-Bounds Write in GLib g_base64_encode()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1484.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1484.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1484
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.0323
published_at 2026-04-04T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03221
published_at 2026-04-02T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04342
published_at 2026-04-13T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04336
published_at 2026-04-07T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04367
published_at 2026-04-08T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04382
published_at 2026-04-09T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04376
published_at 2026-04-11T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04362
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1484
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1484
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126551
reference_id 1126551
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126551
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2433259
reference_id 2433259
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T15:11:56Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2433259
6
reference_url https://gitlab.gnome.org/GNOME/glib/-/issues/3870
reference_id 3870
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T15:11:56Z/
url https://gitlab.gnome.org/GNOME/glib/-/issues/3870
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
12
reference_url https://access.redhat.com/security/cve/CVE-2026-1484
reference_id CVE-2026-1484
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T15:11:56Z/
url https://access.redhat.com/security/cve/CVE-2026-1484
13
reference_url https://usn.ubuntu.com/8017-1/
reference_id USN-8017-1
reference_type
scores
url https://usn.ubuntu.com/8017-1/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u8%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.86.3-5?distro=trixie
purl pkg:deb/debian/glib2.0@2.86.3-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.86.3-5%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2026-1484
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u5sb-ke8a-qkd2
37
url VCID-vrjs-v8f3-s3d7
vulnerability_id VCID-vrjs-v8f3-s3d7
summary
PCRE is vulnerable to multiple buffer overflow and memory corruption
    vulnerabilities, possibly leading to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4766.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4766.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2007-4766
reference_id
reference_type
scores
0
value 0.03859
scoring_system epss
scoring_elements 0.88154
published_at 2026-04-01T12:55:00Z
1
value 0.03859
scoring_system epss
scoring_elements 0.88162
published_at 2026-04-02T12:55:00Z
2
value 0.03859
scoring_system epss
scoring_elements 0.88178
published_at 2026-04-04T12:55:00Z
3
value 0.03859
scoring_system epss
scoring_elements 0.88184
published_at 2026-04-07T12:55:00Z
4
value 0.03859
scoring_system epss
scoring_elements 0.88204
published_at 2026-04-08T12:55:00Z
5
value 0.03859
scoring_system epss
scoring_elements 0.8821
published_at 2026-04-09T12:55:00Z
6
value 0.03859
scoring_system epss
scoring_elements 0.88221
published_at 2026-04-11T12:55:00Z
7
value 0.03859
scoring_system epss
scoring_elements 0.88213
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2007-4766
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4766
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=392891
reference_id 392891
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=392891
4
reference_url https://security.gentoo.org/glsa/200711-30
reference_id GLSA-200711-30
reference_type
scores
url https://security.gentoo.org/glsa/200711-30
5
reference_url https://usn.ubuntu.com/547-1/
reference_id USN-547-1
reference_type
scores
url https://usn.ubuntu.com/547-1/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.14.3-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.14.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.14.3-1%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2007-4766
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vrjs-v8f3-s3d7
38
url VCID-wj2d-k1ha-pqgd
vulnerability_id VCID-wj2d-k1ha-pqgd
summary pcre miscalculation of memory requirements for repeated subpattern containing a named recursion or subroutine reference
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7226.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-7226.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2006-7226
reference_id
reference_type
scores
0
value 0.01719
scoring_system epss
scoring_elements 0.8232
published_at 2026-04-01T12:55:00Z
1
value 0.01719
scoring_system epss
scoring_elements 0.82334
published_at 2026-04-02T12:55:00Z
2
value 0.01719
scoring_system epss
scoring_elements 0.82352
published_at 2026-04-04T12:55:00Z
3
value 0.01719
scoring_system epss
scoring_elements 0.82346
published_at 2026-04-07T12:55:00Z
4
value 0.01719
scoring_system epss
scoring_elements 0.82374
published_at 2026-04-08T12:55:00Z
5
value 0.01719
scoring_system epss
scoring_elements 0.82381
published_at 2026-04-09T12:55:00Z
6
value 0.01719
scoring_system epss
scoring_elements 0.824
published_at 2026-04-11T12:55:00Z
7
value 0.01719
scoring_system epss
scoring_elements 0.82396
published_at 2026-04-12T12:55:00Z
8
value 0.01719
scoring_system epss
scoring_elements 0.82391
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2006-7226
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7226
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7226
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=384781
reference_id 384781
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=384781
4
reference_url https://access.redhat.com/errata/RHSA-2007:1059
reference_id RHSA-2007:1059
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1059
5
reference_url https://access.redhat.com/errata/RHSA-2007:1068
reference_id RHSA-2007:1068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2007:1068
fixed_packages
0
url pkg:deb/debian/glib2.0@2.14.3-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.14.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.14.3-1%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2006-7226
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wj2d-k1ha-pqgd
39
url VCID-xq36-cxqj-h3hh
vulnerability_id VCID-xq36-cxqj-h3hh
summary glib: Integer Overflow in GLib GIO Attribute Escaping Causes Heap Buffer Overflow
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14512.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14512.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14512
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15825
published_at 2026-04-09T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15765
published_at 2026-04-08T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.15888
published_at 2026-04-04T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.1568
published_at 2026-04-07T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15828
published_at 2026-04-02T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15803
published_at 2026-04-11T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.21942
published_at 2026-04-13T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.22001
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14512
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14512
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1122346
reference_id 1122346
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1122346
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2421339
reference_id 2421339
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:54:52Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2421339
6
reference_url https://gitlab.gnome.org/GNOME/glib/-/issues/3845
reference_id 3845
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:54:52Z/
url https://gitlab.gnome.org/GNOME/glib/-/issues/3845
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
reference_id cpe:/a:redhat:hummingbird:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
14
reference_url https://access.redhat.com/security/cve/CVE-2025-14512
reference_id CVE-2025-14512
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-11T14:54:52Z/
url https://access.redhat.com/security/cve/CVE-2025-14512
fixed_packages
0
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u7%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.86.3-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.86.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.86.3-1%3Fdistro=trixie
5
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2025-14512
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xq36-cxqj-h3hh
40
url VCID-xzum-kd1h-nfdk
vulnerability_id VCID-xzum-kd1h-nfdk
summary glib2: Out-of-bounds read in g_markup_parse_context_parse() in gmarkup.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16429.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16429.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16429
reference_id
reference_type
scores
0
value 0.00351
scoring_system epss
scoring_elements 0.5742
published_at 2026-04-01T12:55:00Z
1
value 0.00351
scoring_system epss
scoring_elements 0.57504
published_at 2026-04-02T12:55:00Z
2
value 0.00351
scoring_system epss
scoring_elements 0.57525
published_at 2026-04-04T12:55:00Z
3
value 0.00351
scoring_system epss
scoring_elements 0.57501
published_at 2026-04-07T12:55:00Z
4
value 0.00351
scoring_system epss
scoring_elements 0.57554
published_at 2026-04-08T12:55:00Z
5
value 0.00351
scoring_system epss
scoring_elements 0.57557
published_at 2026-04-09T12:55:00Z
6
value 0.00351
scoring_system epss
scoring_elements 0.57572
published_at 2026-04-11T12:55:00Z
7
value 0.00351
scoring_system epss
scoring_elements 0.57552
published_at 2026-04-12T12:55:00Z
8
value 0.00351
scoring_system epss
scoring_elements 0.5753
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16429
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16429
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1626148
reference_id 1626148
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1626148
5
reference_url https://usn.ubuntu.com/3767-1/
reference_id USN-3767-1
reference_type
scores
url https://usn.ubuntu.com/3767-1/
6
reference_url https://usn.ubuntu.com/3767-2/
reference_id USN-3767-2
reference_type
scores
url https://usn.ubuntu.com/3767-2/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.58.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.58.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.58.0-1%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2018-16429
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xzum-kd1h-nfdk
41
url VCID-z2v6-3j7r-vkaj
vulnerability_id VCID-z2v6-3j7r-vkaj
summary
Uncontrolled Resource Consumption
A flaw was found in GLib. GVariant deserialization fails to validate that the input conforms to the expected format, leading to denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-29499.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-29499.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29499
reference_id
reference_type
scores
0
value 0.0012
scoring_system epss
scoring_elements 0.30963
published_at 2026-04-13T12:55:00Z
1
value 0.0012
scoring_system epss
scoring_elements 0.31095
published_at 2026-04-02T12:55:00Z
2
value 0.0012
scoring_system epss
scoring_elements 0.31142
published_at 2026-04-04T12:55:00Z
3
value 0.0012
scoring_system epss
scoring_elements 0.3096
published_at 2026-04-07T12:55:00Z
4
value 0.0012
scoring_system epss
scoring_elements 0.31016
published_at 2026-04-08T12:55:00Z
5
value 0.0012
scoring_system epss
scoring_elements 0.31045
published_at 2026-04-09T12:55:00Z
6
value 0.0012
scoring_system epss
scoring_elements 0.31051
published_at 2026-04-11T12:55:00Z
7
value 0.0012
scoring_system epss
scoring_elements 0.31008
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29499
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2211828
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:23:31Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2211828
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29499
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29499
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://gitlab.gnome.org/GNOME/glib/-/issues/2794
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:23:31Z/
url https://gitlab.gnome.org/GNOME/glib/-/issues/2794
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
10
reference_url https://access.redhat.com/security/cve/CVE-2023-29499
reference_id CVE-2023-29499
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:23:31Z/
url https://access.redhat.com/security/cve/CVE-2023-29499
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-29499
reference_id CVE-2023-29499
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-29499
12
reference_url https://security.gentoo.org/glsa/202311-18
reference_id GLSA-202311-18
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:23:31Z/
url https://security.gentoo.org/glsa/202311-18
13
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00030.html
reference_id msg00030.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:23:31Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00030.html
14
reference_url https://security.netapp.com/advisory/ntap-20231103-0001/
reference_id ntap-20231103-0001
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-18T15:23:31Z/
url https://security.netapp.com/advisory/ntap-20231103-0001/
15
reference_url https://access.redhat.com/errata/RHSA-2023:6631
reference_id RHSA-2023:6631
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6631
16
reference_url https://access.redhat.com/errata/RHSA-2024:2528
reference_id RHSA-2024:2528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2528
17
reference_url https://usn.ubuntu.com/6165-1/
reference_id USN-6165-1
reference_type
scores
url https://usn.ubuntu.com/6165-1/
18
reference_url https://usn.ubuntu.com/6165-2/
reference_id USN-6165-2
reference_type
scores
url https://usn.ubuntu.com/6165-2/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.4-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.4-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.4-1%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
5
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2023-29499
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z2v6-3j7r-vkaj
42
url VCID-zdk7-7nsk-gbfs
vulnerability_id VCID-zdk7-7nsk-gbfs
summary glib: Integer overflow in g_string_maybe_expand() leading to potential buffer overflow in GLib GString
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6052.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6052.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-6052
reference_id
reference_type
scores
0
value 0.00083
scoring_system epss
scoring_elements 0.24362
published_at 2026-04-04T12:55:00Z
1
value 0.00083
scoring_system epss
scoring_elements 0.24329
published_at 2026-04-02T12:55:00Z
2
value 0.00083
scoring_system epss
scoring_elements 0.24145
published_at 2026-04-07T12:55:00Z
3
value 0.00083
scoring_system epss
scoring_elements 0.24211
published_at 2026-04-08T12:55:00Z
4
value 0.00301
scoring_system epss
scoring_elements 0.53379
published_at 2026-04-09T12:55:00Z
5
value 0.00301
scoring_system epss
scoring_elements 0.53414
published_at 2026-04-12T12:55:00Z
6
value 0.00301
scoring_system epss
scoring_elements 0.53398
published_at 2026-04-13T12:55:00Z
7
value 0.00301
scoring_system epss
scoring_elements 0.5343
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-6052
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107797
reference_id 1107797
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107797
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2372666
reference_id 2372666
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-13T15:58:19Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2372666
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
10
reference_url https://access.redhat.com/security/cve/CVE-2025-6052
reference_id CVE-2025-6052
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-13T15:58:19Z/
url https://access.redhat.com/security/cve/CVE-2025-6052
11
reference_url https://usn.ubuntu.com/7942-1/
reference_id USN-7942-1
reference_type
scores
url https://usn.ubuntu.com/7942-1/
fixed_packages
0
url pkg:deb/debian/glib2.0@0?distro=trixie
purl pkg:deb/debian/glib2.0@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@0%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.3-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.3-1%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
5
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2025-6052
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zdk7-7nsk-gbfs
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie