Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/gtk%2B2.0@0?distro=trixie
Typedeb
Namespacedebian
Namegtk+2.0
Version0
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.4.9-2
Latest_non_vulnerable_version2.24.33-10
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-7ftr-5ebq-fkd7
vulnerability_id VCID-7ftr-5ebq-fkd7
summary Untrusted search path vulnerability in modules/engines/ms-windows/xp_theme.c in GTK+ before 2.24.0 allows local users to gain privileges via a Trojan horse uxtheme.dll file in the current working directory, a different vulnerability than CVE-2010-4831.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4833
reference_id
reference_type
scores
0
value 0.00517
scoring_system epss
scoring_elements 0.66611
published_at 2026-04-01T12:55:00Z
1
value 0.00517
scoring_system epss
scoring_elements 0.66651
published_at 2026-04-07T12:55:00Z
2
value 0.00517
scoring_system epss
scoring_elements 0.66677
published_at 2026-04-04T12:55:00Z
3
value 0.00517
scoring_system epss
scoring_elements 0.667
published_at 2026-04-08T12:55:00Z
4
value 0.00517
scoring_system epss
scoring_elements 0.66715
published_at 2026-04-09T12:55:00Z
5
value 0.00517
scoring_system epss
scoring_elements 0.66735
published_at 2026-04-11T12:55:00Z
6
value 0.00517
scoring_system epss
scoring_elements 0.66722
published_at 2026-04-12T12:55:00Z
7
value 0.00517
scoring_system epss
scoring_elements 0.66692
published_at 2026-04-13T12:55:00Z
8
value 0.00517
scoring_system epss
scoring_elements 0.66726
published_at 2026-04-16T12:55:00Z
9
value 0.00517
scoring_system epss
scoring_elements 0.66739
published_at 2026-04-18T12:55:00Z
10
value 0.00517
scoring_system epss
scoring_elements 0.66724
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4833
fixed_packages
0
url pkg:deb/debian/gtk%2B2.0@0?distro=trixie
purl pkg:deb/debian/gtk%2B2.0@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@0%3Fdistro=trixie
1
url pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/gtk%2B2.0@2.24.33-7?distro=trixie
purl pkg:deb/debian/gtk%2B2.0@2.24.33-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-7%3Fdistro=trixie
4
url pkg:deb/debian/gtk%2B2.0@2.24.33-10?distro=trixie
purl pkg:deb/debian/gtk%2B2.0@2.24.33-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-10%3Fdistro=trixie
aliases CVE-2010-4833
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ftr-5ebq-fkd7
1
url VCID-bcqw-ykyp-93e6
vulnerability_id VCID-bcqw-ykyp-93e6
summary GTK+ 3.10.9 and earlier, as used in cinnamon-screensaver, gnome-screensaver, and other applications, allows physically proximate attackers to bypass the lock screen by pressing the menu button.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1949
reference_id
reference_type
scores
0
value 0.00037
scoring_system epss
scoring_elements 0.11034
published_at 2026-04-01T12:55:00Z
1
value 0.00037
scoring_system epss
scoring_elements 0.11178
published_at 2026-04-02T12:55:00Z
2
value 0.00037
scoring_system epss
scoring_elements 0.11237
published_at 2026-04-04T12:55:00Z
3
value 0.00037
scoring_system epss
scoring_elements 0.11052
published_at 2026-04-07T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.11131
published_at 2026-04-08T12:55:00Z
5
value 0.00037
scoring_system epss
scoring_elements 0.11187
published_at 2026-04-09T12:55:00Z
6
value 0.00037
scoring_system epss
scoring_elements 0.11196
published_at 2026-04-11T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.11164
published_at 2026-04-12T12:55:00Z
8
value 0.00037
scoring_system epss
scoring_elements 0.11138
published_at 2026-04-13T12:55:00Z
9
value 0.00037
scoring_system epss
scoring_elements 0.11003
published_at 2026-04-16T12:55:00Z
10
value 0.00037
scoring_system epss
scoring_elements 0.11013
published_at 2026-04-18T12:55:00Z
11
value 0.00037
scoring_system epss
scoring_elements 0.11144
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1949
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1949
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1949
2
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=738828
reference_id 738828
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=738828
fixed_packages
0
url pkg:deb/debian/gtk%2B2.0@0?distro=trixie
purl pkg:deb/debian/gtk%2B2.0@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@0%3Fdistro=trixie
1
url pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/gtk%2B2.0@2.24.33-7?distro=trixie
purl pkg:deb/debian/gtk%2B2.0@2.24.33-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-7%3Fdistro=trixie
4
url pkg:deb/debian/gtk%2B2.0@2.24.33-10?distro=trixie
purl pkg:deb/debian/gtk%2B2.0@2.24.33-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-10%3Fdistro=trixie
aliases CVE-2014-1949
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bcqw-ykyp-93e6
2
url VCID-s2v6-rey6-jqen
vulnerability_id VCID-s2v6-rey6-jqen
summary Untrusted search path vulnerability in gdk/win32/gdkinput-win32.c in GTK+ before 2.21.8 allows local users to gain privileges via a Trojan horse Wintab32.dll file in the current working directory.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2010-4831
reference_id
reference_type
scores
0
value 0.00122
scoring_system epss
scoring_elements 0.31236
published_at 2026-04-01T12:55:00Z
1
value 0.00122
scoring_system epss
scoring_elements 0.31365
published_at 2026-04-02T12:55:00Z
2
value 0.00122
scoring_system epss
scoring_elements 0.31406
published_at 2026-04-04T12:55:00Z
3
value 0.00122
scoring_system epss
scoring_elements 0.31226
published_at 2026-04-07T12:55:00Z
4
value 0.00122
scoring_system epss
scoring_elements 0.31278
published_at 2026-04-08T12:55:00Z
5
value 0.00122
scoring_system epss
scoring_elements 0.31309
published_at 2026-04-09T12:55:00Z
6
value 0.00122
scoring_system epss
scoring_elements 0.31314
published_at 2026-04-11T12:55:00Z
7
value 0.00122
scoring_system epss
scoring_elements 0.31271
published_at 2026-04-12T12:55:00Z
8
value 0.00122
scoring_system epss
scoring_elements 0.31228
published_at 2026-04-13T12:55:00Z
9
value 0.00122
scoring_system epss
scoring_elements 0.31262
published_at 2026-04-16T12:55:00Z
10
value 0.00122
scoring_system epss
scoring_elements 0.31242
published_at 2026-04-18T12:55:00Z
11
value 0.00122
scoring_system epss
scoring_elements 0.31215
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2010-4831
fixed_packages
0
url pkg:deb/debian/gtk%2B2.0@0?distro=trixie
purl pkg:deb/debian/gtk%2B2.0@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@0%3Fdistro=trixie
1
url pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/gtk%2B2.0@2.24.33-7?distro=trixie
purl pkg:deb/debian/gtk%2B2.0@2.24.33-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-7%3Fdistro=trixie
4
url pkg:deb/debian/gtk%2B2.0@2.24.33-10?distro=trixie
purl pkg:deb/debian/gtk%2B2.0@2.24.33-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-10%3Fdistro=trixie
aliases CVE-2010-4831
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s2v6-rey6-jqen
3
url VCID-z4pw-yw4k-9qch
vulnerability_id VCID-z4pw-yw4k-9qch
summary Untrusted search path vulnerability in GTK2 in OpenSUSE 11.0 and 11.1 allows local users to execute arbitrary code via a Trojan horse GTK module in an unspecified "relative search path."
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-0848
reference_id
reference_type
scores
0
value 0.00189
scoring_system epss
scoring_elements 0.40719
published_at 2026-04-21T12:55:00Z
1
value 0.00189
scoring_system epss
scoring_elements 0.40725
published_at 2026-04-01T12:55:00Z
2
value 0.00189
scoring_system epss
scoring_elements 0.40809
published_at 2026-04-02T12:55:00Z
3
value 0.00189
scoring_system epss
scoring_elements 0.40837
published_at 2026-04-11T12:55:00Z
4
value 0.00189
scoring_system epss
scoring_elements 0.40762
published_at 2026-04-07T12:55:00Z
5
value 0.00189
scoring_system epss
scoring_elements 0.40811
published_at 2026-04-08T12:55:00Z
6
value 0.00189
scoring_system epss
scoring_elements 0.40819
published_at 2026-04-09T12:55:00Z
7
value 0.00189
scoring_system epss
scoring_elements 0.40803
published_at 2026-04-12T12:55:00Z
8
value 0.00189
scoring_system epss
scoring_elements 0.40784
published_at 2026-04-13T12:55:00Z
9
value 0.00189
scoring_system epss
scoring_elements 0.40828
published_at 2026-04-16T12:55:00Z
10
value 0.00189
scoring_system epss
scoring_elements 0.40798
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-0848
2
reference_url http://secunia.com/advisories/34259
reference_id
reference_type
scores
url http://secunia.com/advisories/34259
3
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/49228
reference_id
reference_type
scores
url https://exchange.xforce.ibmcloud.com/vulnerabilities/49228
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-0848
reference_id CVE-2009-0848
reference_type
scores
0
value 4.4
scoring_system cvssv2
scoring_elements AV:L/AC:M/Au:N/C:P/I:P/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2009-0848
fixed_packages
0
url pkg:deb/debian/gtk%2B2.0@0?distro=trixie
purl pkg:deb/debian/gtk%2B2.0@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@0%3Fdistro=trixie
1
url pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/gtk%2B2.0@2.24.33-2%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-2%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/gtk%2B2.0@2.24.33-7?distro=trixie
purl pkg:deb/debian/gtk%2B2.0@2.24.33-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-7%3Fdistro=trixie
4
url pkg:deb/debian/gtk%2B2.0@2.24.33-10?distro=trixie
purl pkg:deb/debian/gtk%2B2.0@2.24.33-10?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@2.24.33-10%3Fdistro=trixie
aliases CVE-2009-0848
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z4pw-yw4k-9qch
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/gtk%252B2.0@0%3Fdistro=trixie