Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/glib2.0@2.86.3-5?distro=trixie
Typedeb
Namespacedebian
Nameglib2.0
Version2.86.3-5
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.88.0-1
Latest_non_vulnerable_version2.88.0-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-a9dn-qcuy-f7cs
vulnerability_id VCID-a9dn-qcuy-f7cs
summary Glib: GLib: Memory corruption via integer overflow in Unicode case conversion
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1489.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1489.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1489
reference_id
reference_type
scores
0
value 0.00057
scoring_system epss
scoring_elements 0.18192
published_at 2026-04-04T12:55:00Z
1
value 0.00057
scoring_system epss
scoring_elements 0.18139
published_at 2026-04-02T12:55:00Z
2
value 0.00066
scoring_system epss
scoring_elements 0.20487
published_at 2026-04-16T12:55:00Z
3
value 0.00066
scoring_system epss
scoring_elements 0.20514
published_at 2026-04-08T12:55:00Z
4
value 0.00066
scoring_system epss
scoring_elements 0.20571
published_at 2026-04-09T12:55:00Z
5
value 0.00066
scoring_system epss
scoring_elements 0.20593
published_at 2026-04-11T12:55:00Z
6
value 0.00066
scoring_system epss
scoring_elements 0.20549
published_at 2026-04-12T12:55:00Z
7
value 0.00066
scoring_system epss
scoring_elements 0.20497
published_at 2026-04-13T12:55:00Z
8
value 0.00066
scoring_system epss
scoring_elements 0.20431
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1489
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1489
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1489
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126549
reference_id 1126549
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126549
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2433348
reference_id 2433348
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T15:09:00Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2433348
6
reference_url https://gitlab.gnome.org/GNOME/glib/-/issues/3872
reference_id 3872
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T15:09:00Z/
url https://gitlab.gnome.org/GNOME/glib/-/issues/3872
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
12
reference_url https://access.redhat.com/security/cve/CVE-2026-1489
reference_id CVE-2026-1489
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T15:09:00Z/
url https://access.redhat.com/security/cve/CVE-2026-1489
13
reference_url https://usn.ubuntu.com/8017-1/
reference_id USN-8017-1
reference_type
scores
url https://usn.ubuntu.com/8017-1/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u8%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.86.3-5?distro=trixie
purl pkg:deb/debian/glib2.0@2.86.3-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.86.3-5%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2026-1489
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a9dn-qcuy-f7cs
1
url VCID-gchd-ewt9-17dk
vulnerability_id VCID-gchd-ewt9-17dk
summary glib: GLib: Denial of Service via Integer Overflow in g_buffered_input_stream_peek()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0988.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-0988.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-0988
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.2099
published_at 2026-04-16T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.2117
published_at 2026-04-02T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.21019
published_at 2026-04-08T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.21079
published_at 2026-04-09T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.21096
published_at 2026-04-11T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.21053
published_at 2026-04-12T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.21001
published_at 2026-04-13T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.21225
published_at 2026-04-04T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20938
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-0988
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0988
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125752
reference_id 1125752
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125752
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2429886
reference_id 2429886
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T14:25:32Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2429886
6
reference_url https://gitlab.gnome.org/GNOME/glib/-/issues/3851
reference_id 3851
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T14:25:32Z/
url https://gitlab.gnome.org/GNOME/glib/-/issues/3851
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
reference_id cpe:/a:redhat:hummingbird:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
13
reference_url https://access.redhat.com/security/cve/CVE-2026-0988
reference_id CVE-2026-0988
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-21T14:25:32Z/
url https://access.redhat.com/security/cve/CVE-2026-0988
14
reference_url https://usn.ubuntu.com/7971-1/
reference_id USN-7971-1
reference_type
scores
url https://usn.ubuntu.com/7971-1/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u8%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.86.3-5?distro=trixie
purl pkg:deb/debian/glib2.0@2.86.3-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.86.3-5%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2026-0988
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gchd-ewt9-17dk
2
url VCID-gwaz-f5mw-j7cb
vulnerability_id VCID-gwaz-f5mw-j7cb
summary Glib: Glib: Local denial of service via buffer underflow in content type parsing
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1485.json
reference_id
reference_type
scores
0
value 2.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1485.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1485
reference_id
reference_type
scores
0
value 5e-05
scoring_system epss
scoring_elements 0.00254
published_at 2026-04-04T12:55:00Z
1
value 5e-05
scoring_system epss
scoring_elements 0.00253
published_at 2026-04-02T12:55:00Z
2
value 6e-05
scoring_system epss
scoring_elements 0.00329
published_at 2026-04-16T12:55:00Z
3
value 6e-05
scoring_system epss
scoring_elements 0.00345
published_at 2026-04-07T12:55:00Z
4
value 6e-05
scoring_system epss
scoring_elements 0.00342
published_at 2026-04-09T12:55:00Z
5
value 6e-05
scoring_system epss
scoring_elements 0.0034
published_at 2026-04-11T12:55:00Z
6
value 6e-05
scoring_system epss
scoring_elements 0.00339
published_at 2026-04-12T12:55:00Z
7
value 6e-05
scoring_system epss
scoring_elements 0.00336
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1485
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1485
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126550
reference_id 1126550
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126550
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2433325
reference_id 2433325
reference_type
scores
0
value 2.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T14:39:59Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2433325
6
reference_url https://gitlab.gnome.org/GNOME/glib/-/issues/3871
reference_id 3871
reference_type
scores
0
value 2.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T14:39:59Z/
url https://gitlab.gnome.org/GNOME/glib/-/issues/3871
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
12
reference_url https://access.redhat.com/security/cve/CVE-2026-1485
reference_id CVE-2026-1485
reference_type
scores
0
value 2.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T14:39:59Z/
url https://access.redhat.com/security/cve/CVE-2026-1485
13
reference_url https://usn.ubuntu.com/8017-1/
reference_id USN-8017-1
reference_type
scores
url https://usn.ubuntu.com/8017-1/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u8%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.86.3-5?distro=trixie
purl pkg:deb/debian/glib2.0@2.86.3-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.86.3-5%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2026-1485
risk_score 1.2
exploitability 0.5
weighted_severity 2.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gwaz-f5mw-j7cb
3
url VCID-u5sb-ke8a-qkd2
vulnerability_id VCID-u5sb-ke8a-qkd2
summary Glib: Integer Overflow Leading to Buffer Underflow and Out-of-Bounds Write in GLib g_base64_encode()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1484.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1484.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1484
reference_id
reference_type
scores
0
value 0.00015
scoring_system epss
scoring_elements 0.0323
published_at 2026-04-04T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.03221
published_at 2026-04-02T12:55:00Z
2
value 0.00018
scoring_system epss
scoring_elements 0.04311
published_at 2026-04-16T12:55:00Z
3
value 0.00018
scoring_system epss
scoring_elements 0.04367
published_at 2026-04-08T12:55:00Z
4
value 0.00018
scoring_system epss
scoring_elements 0.04382
published_at 2026-04-09T12:55:00Z
5
value 0.00018
scoring_system epss
scoring_elements 0.04376
published_at 2026-04-11T12:55:00Z
6
value 0.00018
scoring_system epss
scoring_elements 0.04362
published_at 2026-04-12T12:55:00Z
7
value 0.00018
scoring_system epss
scoring_elements 0.04342
published_at 2026-04-13T12:55:00Z
8
value 0.00018
scoring_system epss
scoring_elements 0.04336
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1484
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1484
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126551
reference_id 1126551
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1126551
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2433259
reference_id 2433259
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T15:11:56Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2433259
6
reference_url https://gitlab.gnome.org/GNOME/glib/-/issues/3870
reference_id 3870
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T15:11:56Z/
url https://gitlab.gnome.org/GNOME/glib/-/issues/3870
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
12
reference_url https://access.redhat.com/security/cve/CVE-2026-1484
reference_id CVE-2026-1484
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-27T15:11:56Z/
url https://access.redhat.com/security/cve/CVE-2026-1484
13
reference_url https://usn.ubuntu.com/8017-1/
reference_id USN-8017-1
reference_type
scores
url https://usn.ubuntu.com/8017-1/
fixed_packages
0
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u4%3Fdistro=trixie
1
url pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u8?distro=trixie
purl pkg:deb/debian/glib2.0@2.66.8-1%2Bdeb11u8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.66.8-1%252Bdeb11u8%3Fdistro=trixie
2
url pkg:deb/debian/glib2.0@2.86.3-5?distro=trixie
purl pkg:deb/debian/glib2.0@2.86.3-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.86.3-5%3Fdistro=trixie
3
url pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
purl pkg:deb/debian/glib2.0@2.88.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.88.0-1%3Fdistro=trixie
aliases CVE-2026-1484
risk_score 2.0
exploitability 0.5
weighted_severity 4.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u5sb-ke8a-qkd2
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/glib2.0@2.86.3-5%3Fdistro=trixie