Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/glib2.0@0?distro=trixie
Typedeb
Namespacedebian
Nameglib2.0
Version0
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.14.3-1
Latest_non_vulnerable_version2.88.0-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-7ruc-s4au-kqe5
vulnerability_id VCID-7ruc-s4au-kqe5
summary glib: glib crash after long command line
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4056.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-4056.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-4056
reference_id
reference_type
scores
0
value 0.00086
scoring_system epss
scoring_elements 0.24722
published_at 2026-04-24T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.26761
published_at 2026-04-02T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26802
published_at 2026-04-04T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26585
published_at 2026-04-07T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.26653
published_at 2026-04-08T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26703
published_at 2026-04-09T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26708
published_at 2026-04-11T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26663
published_at 2026-04-12T12:55:00Z
8
value 0.00102
scoring_system epss
scoring_elements 0.28063
published_at 2026-04-18T12:55:00Z
9
value 0.00102
scoring_system epss
scoring_elements 0.28017
published_at 2026-04-21T12:55:00Z
10
value 0.00102
scoring_system epss
scoring_elements 0.2807
published_at 2026-04-13T12:55:00Z
11
value 0.00102
scoring_system epss
scoring_elements 0.2808
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-4056
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2362826
reference_id 2362826
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T13:24:15Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2362826
3
reference_url https://gitlab.gnome.org/GNOME/glib/-/issues/3668
reference_id 3668
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T13:24:15Z/
url https://gitlab.gnome.org/GNOME/glib/-/issues/3668
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
9
reference_url https://access.redhat.com/security/cve/CVE-2025-4056
reference_id CVE-2025-4056
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-28T13:24:15Z/
url https://access.redhat.com/security/cve/CVE-2025-4056
fixed_packages
0
url pkg:deb/debian/glib2.0@0?distro=trixie
purl pkg:deb/debian/glib2.0@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@0%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2025-4056
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ruc-s4au-kqe5
1
url VCID-cy7v-dhum-gfgk
vulnerability_id VCID-cy7v-dhum-gfgk
summary
Uncontrolled Resource Consumption
A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32636.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32636.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32636
reference_id
reference_type
scores
0
value 0.00165
scoring_system epss
scoring_elements 0.37613
published_at 2026-04-02T12:55:00Z
1
value 0.00165
scoring_system epss
scoring_elements 0.37276
published_at 2026-04-24T12:55:00Z
2
value 0.00165
scoring_system epss
scoring_elements 0.37566
published_at 2026-04-08T12:55:00Z
3
value 0.00165
scoring_system epss
scoring_elements 0.37579
published_at 2026-04-16T12:55:00Z
4
value 0.00165
scoring_system epss
scoring_elements 0.37593
published_at 2026-04-11T12:55:00Z
5
value 0.00165
scoring_system epss
scoring_elements 0.37559
published_at 2026-04-12T12:55:00Z
6
value 0.00165
scoring_system epss
scoring_elements 0.37533
published_at 2026-04-13T12:55:00Z
7
value 0.00165
scoring_system epss
scoring_elements 0.3756
published_at 2026-04-18T12:55:00Z
8
value 0.00165
scoring_system epss
scoring_elements 0.37496
published_at 2026-04-21T12:55:00Z
9
value 0.00165
scoring_system epss
scoring_elements 0.37636
published_at 2026-04-04T12:55:00Z
10
value 0.00165
scoring_system epss
scoring_elements 0.37515
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32636
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://gitlab.gnome.org/GNOME/glib/-/issues/2841
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T17:51:57Z/
url https://gitlab.gnome.org/GNOME/glib/-/issues/2841
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2211833
reference_id 2211833
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2211833
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-32636
reference_id CVE-2023-32636
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-32636
6
reference_url https://security.netapp.com/advisory/ntap-20231110-0002/
reference_id ntap-20231110-0002
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-11T17:51:57Z/
url https://security.netapp.com/advisory/ntap-20231110-0002/
7
reference_url https://access.redhat.com/errata/RHSA-2024:2528
reference_id RHSA-2024:2528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2528
8
reference_url https://usn.ubuntu.com/6165-1/
reference_id USN-6165-1
reference_type
scores
url https://usn.ubuntu.com/6165-1/
9
reference_url https://usn.ubuntu.com/6165-2/
reference_id USN-6165-2
reference_type
scores
url https://usn.ubuntu.com/6165-2/
fixed_packages
0
url pkg:deb/debian/glib2.0@0?distro=trixie
purl pkg:deb/debian/glib2.0@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@0%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2023-32636
risk_score 2.8
exploitability 0.5
weighted_severity 5.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cy7v-dhum-gfgk
2
url VCID-dpz7-pg2m-67hv
vulnerability_id VCID-dpz7-pg2m-67hv
summary
Out-of-bounds Write
A flaw was found in GLib. The GVariant deserialization code is vulnerable to a heap buffer overflow introduced by the fix for CVE-2023-32665. This bug does not affect any released version of GLib, but does affect GLib distributors who followed the guidance of GLib developers to backport the initial fix for CVE-2023-32665.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32643.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32643.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32643
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.13604
published_at 2026-04-04T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13542
published_at 2026-04-02T12:55:00Z
2
value 0.00045
scoring_system epss
scoring_elements 0.13676
published_at 2026-04-24T12:55:00Z
3
value 0.00045
scoring_system epss
scoring_elements 0.13805
published_at 2026-04-09T12:55:00Z
4
value 0.00045
scoring_system epss
scoring_elements 0.13774
published_at 2026-04-11T12:55:00Z
5
value 0.00045
scoring_system epss
scoring_elements 0.13737
published_at 2026-04-12T12:55:00Z
6
value 0.00045
scoring_system epss
scoring_elements 0.13687
published_at 2026-04-13T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.13598
published_at 2026-04-16T12:55:00Z
8
value 0.00045
scoring_system epss
scoring_elements 0.13595
published_at 2026-04-18T12:55:00Z
9
value 0.00045
scoring_system epss
scoring_elements 0.13668
published_at 2026-04-21T12:55:00Z
10
value 0.00045
scoring_system epss
scoring_elements 0.13672
published_at 2026-04-07T12:55:00Z
11
value 0.00045
scoring_system epss
scoring_elements 0.13755
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32643
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://gitlab.gnome.org/GNOME/glib/-/issues/2840
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-14T17:30:47Z/
url https://gitlab.gnome.org/GNOME/glib/-/issues/2840
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2211832
reference_id 2211832
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2211832
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-32643
reference_id CVE-2023-32643
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-32643
6
reference_url https://security.netapp.com/advisory/ntap-20240426-0005/
reference_id ntap-20240426-0005
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-14T17:30:47Z/
url https://security.netapp.com/advisory/ntap-20240426-0005/
7
reference_url https://usn.ubuntu.com/6165-1/
reference_id USN-6165-1
reference_type
scores
url https://usn.ubuntu.com/6165-1/
8
reference_url https://usn.ubuntu.com/6165-2/
reference_id USN-6165-2
reference_type
scores
url https://usn.ubuntu.com/6165-2/
fixed_packages
0
url pkg:deb/debian/glib2.0@0?distro=trixie
purl pkg:deb/debian/glib2.0@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@0%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2023-32643
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dpz7-pg2m-67hv
3
url VCID-ezwm-38cx-tfct
vulnerability_id VCID-ezwm-38cx-tfct
summary glib: g_socket_client_connected_callback in gio/gsocketclient.c allows to cause denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9633.json
reference_id
reference_type
scores
0
value 8.2
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-9633.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-9633
reference_id
reference_type
scores
0
value 0.00654
scoring_system epss
scoring_elements 0.70867
published_at 2026-04-01T12:55:00Z
1
value 0.00654
scoring_system epss
scoring_elements 0.71011
published_at 2026-04-24T12:55:00Z
2
value 0.00654
scoring_system epss
scoring_elements 0.7097
published_at 2026-04-16T12:55:00Z
3
value 0.00654
scoring_system epss
scoring_elements 0.70977
published_at 2026-04-18T12:55:00Z
4
value 0.00654
scoring_system epss
scoring_elements 0.70956
published_at 2026-04-21T12:55:00Z
5
value 0.00654
scoring_system epss
scoring_elements 0.70881
published_at 2026-04-02T12:55:00Z
6
value 0.00654
scoring_system epss
scoring_elements 0.70899
published_at 2026-04-04T12:55:00Z
7
value 0.00654
scoring_system epss
scoring_elements 0.70874
published_at 2026-04-07T12:55:00Z
8
value 0.00654
scoring_system epss
scoring_elements 0.70917
published_at 2026-04-08T12:55:00Z
9
value 0.00654
scoring_system epss
scoring_elements 0.70932
published_at 2026-04-09T12:55:00Z
10
value 0.00654
scoring_system epss
scoring_elements 0.70955
published_at 2026-04-11T12:55:00Z
11
value 0.00654
scoring_system epss
scoring_elements 0.7094
published_at 2026-04-12T12:55:00Z
12
value 0.00654
scoring_system epss
scoring_elements 0.70924
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-9633
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://gitlab.gnome.org/GNOME/glib/issues/1649
reference_id
reference_type
scores
url https://gitlab.gnome.org/GNOME/glib/issues/1649
4
reference_url http://www.securityfocus.com/bid/107391
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/107391
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1687805
reference_id 1687805
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1687805
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:glib:2.59.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnome:glib:2.59.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnome:glib:2.59.2:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-9633
reference_id CVE-2019-9633
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-9633
fixed_packages
0
url pkg:deb/debian/glib2.0@0?distro=trixie
purl pkg:deb/debian/glib2.0@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@0%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2019-9633
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ezwm-38cx-tfct
4
url VCID-zdk7-7nsk-gbfs
vulnerability_id VCID-zdk7-7nsk-gbfs
summary glib: Integer overflow in g_string_maybe_expand() leading to potential buffer overflow in GLib GString
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6052.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6052.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-6052
reference_id
reference_type
scores
0
value 0.00083
scoring_system epss
scoring_elements 0.24211
published_at 2026-04-08T12:55:00Z
1
value 0.00083
scoring_system epss
scoring_elements 0.24329
published_at 2026-04-02T12:55:00Z
2
value 0.00083
scoring_system epss
scoring_elements 0.24362
published_at 2026-04-04T12:55:00Z
3
value 0.00083
scoring_system epss
scoring_elements 0.24145
published_at 2026-04-07T12:55:00Z
4
value 0.00301
scoring_system epss
scoring_elements 0.53421
published_at 2026-04-21T12:55:00Z
5
value 0.00301
scoring_system epss
scoring_elements 0.53393
published_at 2026-04-24T12:55:00Z
6
value 0.00301
scoring_system epss
scoring_elements 0.53398
published_at 2026-04-13T12:55:00Z
7
value 0.00301
scoring_system epss
scoring_elements 0.53435
published_at 2026-04-16T12:55:00Z
8
value 0.00301
scoring_system epss
scoring_elements 0.53441
published_at 2026-04-18T12:55:00Z
9
value 0.00301
scoring_system epss
scoring_elements 0.53379
published_at 2026-04-09T12:55:00Z
10
value 0.00301
scoring_system epss
scoring_elements 0.5343
published_at 2026-04-11T12:55:00Z
11
value 0.00301
scoring_system epss
scoring_elements 0.53414
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-6052
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107797
reference_id 1107797
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1107797
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2372666
reference_id 2372666
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-13T15:58:19Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2372666
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
10
reference_url https://access.redhat.com/security/cve/CVE-2025-6052
reference_id CVE-2025-6052
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-13T15:58:19Z/
url https://access.redhat.com/security/cve/CVE-2025-6052
11
reference_url https://usn.ubuntu.com/7942-1/
reference_id USN-7942-1
reference_type
scores
url https://usn.ubuntu.com/7942-1/
fixed_packages
0
url pkg:deb/debian/glib2.0@0?distro=trixie
purl pkg:deb/debian/glib2.0@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@0%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.74.6-2%2Bdeb12u8?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.74.6-2%252Bdeb12u8%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.84.3-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.3-1%3Fdistro=trixie
4
url pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
purl pkg:deb/debian/glib2.0@2.84.4-3~deb13u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-a9dn-qcuy-f7cs
1
vulnerability VCID-gchd-ewt9-17dk
2
vulnerability VCID-gwaz-f5mw-j7cb
3
vulnerability VCID-u5sb-ke8a-qkd2
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.84.4-3~deb13u2%3Fdistro=trixie
5
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2025-6052
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zdk7-7nsk-gbfs
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@0%3Fdistro=trixie