Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/931745?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/931745?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie", "type": "deb", "namespace": "debian", "name": "netpbm-free", "version": "2:11.01.00-2", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "2:11.10.02-1", "latest_non_vulnerable_version": "2:11.13.03+ds-2", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90366?format=api", "vulnerability_id": "VCID-5wj4-5xbm-wuaz", "summary": "Buffer overflow in pamtofits of NetPBM 10.30 through 10.33 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code when assembling the header, possibly related to an off-by-one error.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3145.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3145.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3145", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03748", "scoring_system": "epss", "scoring_elements": "0.87965", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03748", "scoring_system": "epss", "scoring_elements": "0.87975", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03748", "scoring_system": "epss", "scoring_elements": "0.87989", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03748", "scoring_system": "epss", "scoring_elements": "0.87994", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03748", "scoring_system": "epss", "scoring_elements": "0.88014", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03748", "scoring_system": "epss", "scoring_elements": "0.88021", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03748", "scoring_system": "epss", "scoring_elements": "0.88031", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03748", "scoring_system": "epss", "scoring_elements": "0.88024", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03748", "scoring_system": "epss", "scoring_elements": "0.88037", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-3145" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931755?format=api", "purl": "pkg:deb/debian/netpbm-free@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931747?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931745?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931750?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931748?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931749?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2006-3145" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5wj4-5xbm-wuaz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89737?format=api", "vulnerability_id": "VCID-6379-1fut-nbhm", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0146.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0146.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0146", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03882", "scoring_system": "epss", "scoring_elements": "0.88188", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03882", "scoring_system": "epss", "scoring_elements": "0.88196", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03882", "scoring_system": "epss", "scoring_elements": "0.88212", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03882", "scoring_system": "epss", "scoring_elements": "0.88218", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03882", "scoring_system": "epss", "scoring_elements": "0.88237", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03882", "scoring_system": "epss", "scoring_elements": "0.88243", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03882", "scoring_system": "epss", "scoring_elements": "0.88255", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03882", "scoring_system": "epss", "scoring_elements": "0.88247", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03882", "scoring_system": "epss", "scoring_elements": "0.88261", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0146" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0146", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0146" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616985", "reference_id": "1616985", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616985" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:060", "reference_id": "RHSA-2003:060", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:060" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2003:061", "reference_id": "RHSA-2003:061", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2003:061" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931746?format=api", "purl": "pkg:deb/debian/netpbm-free@2:9.20-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:9.20-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931747?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931745?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931750?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931748?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931749?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2003-0146" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6379-1fut-nbhm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84610?format=api", "vulnerability_id": "VCID-8fjp-kfqu-x7da", "summary": "netpbm: Out-of-bounds write in writeRasterPbm() function", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2581.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2581.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2581", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.4987", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49908", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49935", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49885", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.4994", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49933", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49951", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49923", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49924", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.4997", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2581" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1411409", "reference_id": "1411409", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1411409" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854978", "reference_id": "854978", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854978" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931755?format=api", "purl": "pkg:deb/debian/netpbm-free@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931747?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931758?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.97.00-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.97.00-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931745?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931750?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931748?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931749?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-2581" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8fjp-kfqu-x7da" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88942?format=api", "vulnerability_id": "VCID-8hkk-cuf8-c3fp", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3632.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3632.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3632", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.47844", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.47722", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.4776", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.47779", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.47728", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.47783", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.47803", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00245", "scoring_system": "epss", "scoring_elements": "0.47789", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3632" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3632", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3632" }, { "reference_url": "http://secunia.com/advisories/17544", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17544" }, { "reference_url": "http://secunia.com/advisories/17671", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17671" }, { "reference_url": "http://secunia.com/advisories/17679", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17679" }, { "reference_url": "http://secunia.com/advisories/17828", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17828" }, { "reference_url": "http://secunia.com/advisories/18186", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18186" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11165", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11165" }, { "reference_url": "http://www.debian.org/security/2005/dsa-904", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-904" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:217", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:217" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2005_28_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2005_28_sr.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-843.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-843.html" }, { "reference_url": "http://www.securityfocus.com/bid/15514", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/15514" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2418", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2418" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617833", "reference_id": "1617833", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617833" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=351639", "reference_id": "351639", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=351639" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3632", "reference_id": "CVE-2005-3632", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3632" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:843", "reference_id": "RHSA-2005:843", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:843" }, { "reference_url": "https://usn.ubuntu.com/218-1/", "reference_id": "USN-218-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/218-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931754?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-10.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-10.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931747?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931745?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931750?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931748?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931749?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2005-3632" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8hkk-cuf8-c3fp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84607?format=api", "vulnerability_id": "VCID-8x21-r48h-affp", "summary": "netpbm: Insufficient size check of memory allocation in createCanvas() function", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2587.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2587.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2587", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.3317", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33298", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.3333", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33163", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33206", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.3324", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33243", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33202", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33179", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00135", "scoring_system": "epss", "scoring_elements": "0.33219", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2587" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419542", "reference_id": "1419542", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419542" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931755?format=api", "purl": "pkg:deb/debian/netpbm-free@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931747?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931745?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931750?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931748?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931749?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-2587" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8x21-r48h-affp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48761?format=api", "vulnerability_id": "VCID-932v-xwug-nbfy", "summary": "Multiple memory management errors in JasPer might lead to execution of\n arbitrary code via jpeg2k files.", "references": [ { "reference_url": "http://bugs.gentoo.org/show_bug.cgi?id=222819", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.gentoo.org/show_bug.cgi?id=222819" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0698.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-0698.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3520.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3520.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3520", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02999", "scoring_system": "epss", "scoring_elements": "0.86576", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02999", "scoring_system": "epss", "scoring_elements": "0.86563", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02999", "scoring_system": "epss", "scoring_elements": "0.86501", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02999", "scoring_system": "epss", "scoring_elements": "0.86511", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02999", "scoring_system": "epss", "scoring_elements": "0.8653", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02999", "scoring_system": "epss", "scoring_elements": "0.86528", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02999", "scoring_system": "epss", "scoring_elements": "0.86548", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02999", "scoring_system": "epss", "scoring_elements": "0.86558", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02999", "scoring_system": "epss", "scoring_elements": "0.86573", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02999", "scoring_system": "epss", "scoring_elements": "0.86569", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520" }, { "reference_url": "http://secunia.com/advisories/33173", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33173" }, { "reference_url": "http://secunia.com/advisories/34391", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34391" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200812-18.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200812-18.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45621", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45621" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10141", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10141" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:142", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:142" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:144", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:144" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:164", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:164" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2009-0012.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2009-0012.html" }, { "reference_url": "http://www.securityfocus.com/bid/31470", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/31470" }, { "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606" }, { "reference_url": "http://www.ubuntu.com/usn/USN-742-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-742-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=461476", "reference_id": "461476", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=461476" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559778", "reference_id": "559778", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559778" }, { "reference_url": "https://security.archlinux.org/AVG-99", "reference_id": "AVG-99", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-99" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3520", "reference_id": "CVE-2008-3520", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3520" }, { "reference_url": "https://security.gentoo.org/glsa/200812-18", "reference_id": "GLSA-200812-18", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200812-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0012", "reference_id": "RHSA-2009:0012", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0012" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0698", "reference_id": "RHSA-2015:0698", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0698" }, { "reference_url": "https://usn.ubuntu.com/1317-1/", "reference_id": "USN-1317-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1317-1/" }, { "reference_url": "https://usn.ubuntu.com/742-1/", "reference_id": "USN-742-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/742-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931755?format=api", "purl": "pkg:deb/debian/netpbm-free@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931747?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931745?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931750?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931748?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931749?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-3520" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-932v-xwug-nbfy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90541?format=api", "vulnerability_id": "VCID-ma8q-csum-fqa9", "summary": "pamperspective in Netpbm before 10.35.48 does not properly calculate a window height, which allows context-dependent attackers to cause a denial of service (crash) via a crafted image file that triggers an out-of-bounds read.", "references": [ { "reference_url": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY", "reference_id": "", "reference_type": "", "scores": [], "url": "http://netpbm.svn.sourceforge.net/viewvc/netpbm/stable/doc/HISTORY" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4799.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-4799.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4799", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.6772", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.67606", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.67642", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.67663", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.67643", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.67694", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.67709", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.67732", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.67717", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00542", "scoring_system": "epss", "scoring_elements": "0.67684", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-4799" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46054", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46054" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00058.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00058.html" }, { "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00069.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00069.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2008/10/22/7", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2008/10/22/7" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2008/10/23/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2008/10/23/2" }, { "reference_url": "http://www.securityfocus.com/bid/31871", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/31871" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.26:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.26:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.26:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.27:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.27:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.27:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.28:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.28:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.28:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.29:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.29:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.29:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.31:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.31:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.31:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.32:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.32:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.32:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.33:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.33:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.33:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.34:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.34:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.34:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.00:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.00:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.00:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.01:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.01:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.01:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.02:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.02:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.02:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.03:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.03:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.03:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.05:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.05:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.05:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.07:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.07:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.07:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.08:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.08:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.08:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.09:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.09:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.09:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.26:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.26:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.26:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.27:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.27:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.27:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.28:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.28:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.28:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.29:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.29:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.29:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.30:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.30:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.30:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.31:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.31:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.31:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.32:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.32:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.32:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.33:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.33:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.33:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.34:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.34:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.34:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.35:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.35:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.35:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.36:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.36:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.36:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.37:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.37:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.37:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.38:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.38:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.38:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.39:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.39:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.39:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.40:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.40:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.40:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.41:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.41:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.41:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.42:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.42:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.42:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.43:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.43:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.43:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.44:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.44:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.44:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.45:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.45:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.45:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.46:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.35.46:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.35.46:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:9.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:9.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4799", "reference_id": "CVE-2008-4799", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-4799" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931755?format=api", "purl": "pkg:deb/debian/netpbm-free@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931747?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931745?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931750?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931748?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931749?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-4799" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ma8q-csum-fqa9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60622?format=api", "vulnerability_id": "VCID-mbac-cudj-wfaj", "summary": "A vulnerability in Netpbm could result in execution of arbitrary\n code or Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4274.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4274.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4274", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02543", "scoring_system": "epss", "scoring_elements": "0.85471", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02543", "scoring_system": "epss", "scoring_elements": "0.85467", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02543", "scoring_system": "epss", "scoring_elements": "0.85491", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02611", "scoring_system": "epss", "scoring_elements": "0.85604", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02611", "scoring_system": "epss", "scoring_elements": "0.85624", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02611", "scoring_system": "epss", "scoring_elements": "0.85569", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02611", "scoring_system": "epss", "scoring_elements": "0.8565", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02611", "scoring_system": "epss", "scoring_elements": "0.85635", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02611", "scoring_system": "epss", "scoring_elements": "0.85581", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02611", "scoring_system": "epss", "scoring_elements": "0.85598", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4274" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4274", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4274" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=546580", "reference_id": "546580", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=546580" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=569060", "reference_id": "569060", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=569060" }, { "reference_url": "https://security.gentoo.org/glsa/201311-08", "reference_id": "GLSA-201311-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201311-08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1811", "reference_id": "RHSA-2011:1811", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1811" }, { "reference_url": "https://usn.ubuntu.com/934-1/", "reference_id": "USN-934-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/934-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931757?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-12.2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-12.2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931747?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931745?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931750?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931748?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931749?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-4274" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mbac-cudj-wfaj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84608?format=api", "vulnerability_id": "VCID-q4qe-yn6z-nqhk", "summary": "netpbm: Out-of-bounds read in expandCodeOntoStack()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2579.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2579.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2579", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63262", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63322", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63349", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63315", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63366", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63384", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63401", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63348", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00443", "scoring_system": "epss", "scoring_elements": "0.63381", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2579" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1411404", "reference_id": "1411404", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1411404" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854978", "reference_id": "854978", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854978" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931755?format=api", "purl": "pkg:deb/debian/netpbm-free@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931747?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931758?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.97.00-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.97.00-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931745?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931750?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931748?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931749?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-2579" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q4qe-yn6z-nqhk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88950?format=api", "vulnerability_id": "VCID-qa1v-juda-mbgv", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2978.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2978.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2978", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04583", "scoring_system": "epss", "scoring_elements": "0.89234", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04583", "scoring_system": "epss", "scoring_elements": "0.89174", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04583", "scoring_system": "epss", "scoring_elements": "0.8918", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04583", "scoring_system": "epss", "scoring_elements": "0.89194", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04583", "scoring_system": "epss", "scoring_elements": "0.89197", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04583", "scoring_system": "epss", "scoring_elements": "0.89215", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04583", "scoring_system": "epss", "scoring_elements": "0.89219", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04583", "scoring_system": "epss", "scoring_elements": "0.89229", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04583", "scoring_system": "epss", "scoring_elements": "0.89225", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04583", "scoring_system": "epss", "scoring_elements": "0.89222", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2978" }, { "reference_url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168278", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=168278" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2978", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2978" }, { "reference_url": "http://secunia.com/advisories/17221", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17221" }, { "reference_url": "http://secunia.com/advisories/17222", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17222" }, { "reference_url": "http://secunia.com/advisories/17256", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17256" }, { "reference_url": "http://secunia.com/advisories/17265", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17265" }, { "reference_url": "http://secunia.com/advisories/17282", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17282" }, { "reference_url": "http://secunia.com/advisories/17357", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17357" }, { "reference_url": "http://securitytracker.com/id?1015071", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1015071" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10135", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10135" }, { "reference_url": "http://www.debian.org/security/2005/dsa-878", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-878" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200510-18.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200510-18.xml" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2005_24_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2005_24_sr.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-793.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-793.html" }, { "reference_url": "http://www.securityfocus.com/bid/15128", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/15128" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2133", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2133" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617774", "reference_id": "1617774", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617774" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.12:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.12:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.12:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.13:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.13:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.13:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.16:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.16:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.16:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.17:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.17:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.17:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.18:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.18:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.18:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.19:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.19:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.19:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.20:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.20:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.20:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.21:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.21:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.21:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.22:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.22:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.22:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.23:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.23:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.23:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:10.9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:10.9:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2978", "reference_id": "CVE-2005-2978", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2978" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:793", "reference_id": "RHSA-2005:793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:793" }, { "reference_url": "https://usn.ubuntu.com/210-1/", "reference_id": "USN-210-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/210-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931753?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-10?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-10%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931747?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931745?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931750?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931748?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931749?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2005-2978" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qa1v-juda-mbgv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/83591?format=api", "vulnerability_id": "VCID-qxkx-jxqj-8yhb", "summary": "netpbm: heap-buffer-overflow in pm_mallocarray2 function in lib/util/mallocvar.c", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8975.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8975.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-8975", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00454", "scoring_system": "epss", "scoring_elements": "0.63729", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00454", "scoring_system": "epss", "scoring_elements": "0.6379", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00454", "scoring_system": "epss", "scoring_elements": "0.63816", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00454", "scoring_system": "epss", "scoring_elements": "0.63774", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00454", "scoring_system": "epss", "scoring_elements": "0.63824", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00454", "scoring_system": "epss", "scoring_elements": "0.63841", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00454", "scoring_system": "epss", "scoring_elements": "0.63856", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64825", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00475", "scoring_system": "epss", "scoring_elements": "0.64787", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-8975" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561206", "reference_id": "1561206", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561206" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931755?format=api", "purl": "pkg:deb/debian/netpbm-free@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931747?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931745?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931750?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931748?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931749?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2018-8975" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qxkx-jxqj-8yhb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88943?format=api", "vulnerability_id": "VCID-qyx6-j4fm-cbc9", "summary": "security flaw", "references": [ { "reference_url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U", "reference_id": "", "reference_type": "", "scores": [], "url": "ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3662.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-3662.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3662", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51364", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51225", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51277", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51302", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51261", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51316", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51313", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51357", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51336", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51322", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-3662" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3662", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3662" }, { "reference_url": "http://secunia.com/advisories/17544", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17544" }, { "reference_url": "http://secunia.com/advisories/17671", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17671" }, { "reference_url": "http://secunia.com/advisories/17679", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17679" }, { "reference_url": "http://secunia.com/advisories/17828", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/17828" }, { "reference_url": "http://secunia.com/advisories/18186", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18186" }, { "reference_url": "http://secunia.com/advisories/18517", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18517" }, { "reference_url": "http://sourceforge.net/project/shownotes.php?release_id=370545", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sourceforge.net/project/shownotes.php?release_id=370545" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9583" }, { "reference_url": "http://www.debian.org/security/2005/dsa-904", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2005/dsa-904" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:217", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:217" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2005_28_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2005_28_sr.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-843.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-843.html" }, { "reference_url": "http://www.securityfocus.com/bid/15427", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/15427" }, { "reference_url": "http://www.vupen.com/english/advisories/2005/2418", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2005/2418" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617836", "reference_id": "1617836", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617836" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=351639", "reference_id": "351639", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=351639" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:greg_roelofs:pnmtopng:2.37.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:greg_roelofs:pnmtopng:2.37.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:greg_roelofs:pnmtopng:2.37.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:greg_roelofs:pnmtopng:2.37.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.37.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.38:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:greg_roelofs:pnmtopng:2.38:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:greg_roelofs:pnmtopng:2.38:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3662", "reference_id": "CVE-2005-3662", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3662" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:843", "reference_id": "RHSA-2005:843", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:843" }, { "reference_url": "https://usn.ubuntu.com/218-1/", "reference_id": "USN-218-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/218-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931754?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-10.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-10.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931747?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931745?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931750?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931748?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931749?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2005-3662" ], "risk_score": 2.0, "exploitability": "0.5", "weighted_severity": "4.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qyx6-j4fm-cbc9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84618?format=api", "vulnerability_id": "VCID-rhmk-vmzk-hybk", "summary": "netpbm: Calls TIFFRGBA with width and height parameters switched", "references": [ { "reference_url": "http://bugzilla.maptools.org/show_bug.cgi?id=2654", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugzilla.maptools.org/show_bug.cgi?id=2654" }, { "reference_url": "http://bugzilla.maptools.org/show_bug.cgi?id=2655", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugzilla.maptools.org/show_bug.cgi?id=2655" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5849.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5849.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5849", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46185", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46313", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46252", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46275", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46247", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46256", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46227", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46246", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46194", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.4625", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5849" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.4", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "4.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AF42A624FXVY3BYBHMAO6F2X7EJYHQE2/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AF42A624FXVY3BYBHMAO6F2X7EJYHQE2/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LDK3BDMKIQL2NQ3SJZXPBEN2LSOUSSEE/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LDK3BDMKIQL2NQ3SJZXPBEN2LSOUSSEE/" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2017/02/02/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2017/02/02/2" }, { "reference_url": "http://www.securityfocus.com/bid/96011", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/96011" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419650", "reference_id": "1419650", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419650" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm_project:netpbm:10.47.63:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm_project:netpbm:10.47.63:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm_project:netpbm:10.47.63:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5849", "reference_id": "CVE-2017-5849", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" }, { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5849" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931755?format=api", "purl": "pkg:deb/debian/netpbm-free@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931747?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931745?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931750?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931748?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931749?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-5849" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rhmk-vmzk-hybk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49989?format=api", "vulnerability_id": "VCID-rqj6-vs48-ufbd", "summary": "Utilities included in old Netpbm versions are vulnerable to multiple\n temporary files issues, potentially allowing a local attacker to overwrite\n files with the rights of the user running the utility.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0924.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2003-0924.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0924", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27646", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27686", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27724", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27514", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27582", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27625", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.2763", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27586", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27529", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27538", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2003-0924" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0924", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0924" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617099", "reference_id": "1617099", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617099" }, { "reference_url": "https://security.gentoo.org/glsa/200410-02", "reference_id": "GLSA-200410-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200410-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2004:030", "reference_id": "RHSA-2004:030", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2004:030" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2004:031", "reference_id": "RHSA-2004:031", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2004:031" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931751?format=api", "purl": "pkg:deb/debian/netpbm-free@2:9.25-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:9.25-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931747?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931745?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931750?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931748?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931749?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2003-0924" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rqj6-vs48-ufbd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88531?format=api", "vulnerability_id": "VCID-s9g2-dgbd-akgx", "summary": "netpbm: GIF handling buffer overflow in giftopnm", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0554.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-0554.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0554", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01722", "scoring_system": "epss", "scoring_elements": "0.8233", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01722", "scoring_system": "epss", "scoring_elements": "0.82344", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01722", "scoring_system": "epss", "scoring_elements": "0.82361", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01722", "scoring_system": "epss", "scoring_elements": "0.82357", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01722", "scoring_system": "epss", "scoring_elements": "0.82385", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01722", "scoring_system": "epss", "scoring_elements": "0.82392", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01722", "scoring_system": "epss", "scoring_elements": "0.82411", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01722", "scoring_system": "epss", "scoring_elements": "0.82408", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01722", "scoring_system": "epss", "scoring_elements": "0.82402", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01722", "scoring_system": "epss", "scoring_elements": "0.82436", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-0554" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0554", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0554" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=431525", "reference_id": "431525", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=431525" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464056", "reference_id": "464056", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=464056" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0131", "reference_id": "RHSA-2008:0131", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0131" }, { "reference_url": "https://usn.ubuntu.com/665-1/", "reference_id": "USN-665-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/665-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931756?format=api", "purl": "pkg:deb/debian/netpbm-free@10.0-11.1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@10.0-11.1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931747?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931745?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931750?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931748?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931749?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-0554" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s9g2-dgbd-akgx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48762?format=api", "vulnerability_id": "VCID-tqtm-achn-z3fg", "summary": "Multiple memory management errors in JasPer might lead to execution of\n arbitrary code via jpeg2k files.", "references": [ { "reference_url": "http://bugs.gentoo.org/attachment.cgi?id=163282&action=view", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.gentoo.org/attachment.cgi?id=163282&action=view" }, { "reference_url": "http://bugs.gentoo.org/show_bug.cgi?id=222819", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.gentoo.org/show_bug.cgi?id=222819" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0698.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-0698.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3522.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-3522.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3522", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0425", "scoring_system": "epss", "scoring_elements": "0.88822", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0425", "scoring_system": "epss", "scoring_elements": "0.88808", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0425", "scoring_system": "epss", "scoring_elements": "0.88753", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0425", "scoring_system": "epss", "scoring_elements": "0.88762", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0425", "scoring_system": "epss", "scoring_elements": "0.88777", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0425", "scoring_system": "epss", "scoring_elements": "0.88779", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0425", "scoring_system": "epss", "scoring_elements": "0.88796", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0425", "scoring_system": "epss", "scoring_elements": "0.88801", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0425", "scoring_system": "epss", "scoring_elements": "0.88813", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-3522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522" }, { "reference_url": "http://secunia.com/advisories/33173", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33173" }, { "reference_url": "http://secunia.com/advisories/34391", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34391" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200812-18.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200812-18.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45623", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45623" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:142", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:142" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:144", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:144" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:164", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:164" }, { "reference_url": "http://www.securityfocus.com/bid/31470", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/31470" }, { "reference_url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606" }, { "reference_url": "http://www.ubuntu.com/usn/USN-742-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-742-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=461478", "reference_id": "461478", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=461478" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559778", "reference_id": "559778", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=559778" }, { "reference_url": "https://security.archlinux.org/AVG-99", "reference_id": "AVG-99", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-99" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:jasper_project:jasper:1.900.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:enterprise_virtualization:3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:enterprise_virtualization:3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3522", "reference_id": "CVE-2008-3522", "reference_type": "", "scores": [ { "value": "10.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-3522" }, { "reference_url": "https://security.gentoo.org/glsa/200812-18", "reference_id": "GLSA-200812-18", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200812-18" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0698", "reference_id": "RHSA-2015:0698", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0698" }, { "reference_url": "https://usn.ubuntu.com/1317-1/", "reference_id": "USN-1317-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1317-1/" }, { "reference_url": "https://usn.ubuntu.com/742-1/", "reference_id": "USN-742-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/742-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931755?format=api", "purl": "pkg:deb/debian/netpbm-free@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931747?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931745?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931750?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931748?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931749?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-3522" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tqtm-achn-z3fg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84609?format=api", "vulnerability_id": "VCID-tuqm-jg2y-zqak", "summary": "netpbm: Out-of-bounds write of heap data", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2580.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2580.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2580", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0029", "scoring_system": "epss", "scoring_elements": "0.52331", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0029", "scoring_system": "epss", "scoring_elements": "0.52376", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0029", "scoring_system": "epss", "scoring_elements": "0.52403", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0029", "scoring_system": "epss", "scoring_elements": "0.52369", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0029", "scoring_system": "epss", "scoring_elements": "0.52421", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0029", "scoring_system": "epss", "scoring_elements": "0.52417", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0029", "scoring_system": "epss", "scoring_elements": "0.52468", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0029", "scoring_system": "epss", "scoring_elements": "0.52452", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0029", "scoring_system": "epss", "scoring_elements": "0.52435", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0029", "scoring_system": "epss", "scoring_elements": "0.52475", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2580" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1411408", "reference_id": "1411408", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1411408" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854978", "reference_id": "854978", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=854978" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931755?format=api", "purl": "pkg:deb/debian/netpbm-free@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931747?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931758?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.97.00-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.97.00-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931745?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931750?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931748?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931749?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-2580" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tuqm-jg2y-zqak" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89028?format=api", "vulnerability_id": "VCID-u4te-rujr-x7ek", "summary": "security flaw", "references": [ { "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319757", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319757" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2471.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2471.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2471", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02055", "scoring_system": "epss", "scoring_elements": "0.83916", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02055", "scoring_system": "epss", "scoring_elements": "0.83817", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02055", "scoring_system": "epss", "scoring_elements": "0.8383", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02055", "scoring_system": "epss", "scoring_elements": "0.83845", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02055", "scoring_system": "epss", "scoring_elements": "0.83847", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02055", "scoring_system": "epss", "scoring_elements": "0.83871", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02055", "scoring_system": "epss", "scoring_elements": "0.83877", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02055", "scoring_system": "epss", "scoring_elements": "0.83893", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02055", "scoring_system": "epss", "scoring_elements": "0.83887", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02055", "scoring_system": "epss", "scoring_elements": "0.83883", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-2471" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2471", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2471" }, { "reference_url": "http://secunia.com/advisories/16184", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/16184" }, { "reference_url": "http://secunia.com/advisories/18330", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/18330" }, { "reference_url": "http://secunia.com/advisories/19436", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/19436" }, { "reference_url": "http://securitytracker.com/id?1014752", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1014752" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21500", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21500" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11645", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11645" }, { "reference_url": "http://www.debian.org/security/2006/dsa-1021", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2006/dsa-1021" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html" }, { "reference_url": "http://www.osvdb.org/18253", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.osvdb.org/18253" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-743.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-743.html" }, { "reference_url": "http://www.securityfocus.com/bid/14379", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/14379" }, { "reference_url": "http://www.trustix.org/errata/2005/0038/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2005/0038/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617722", "reference_id": "1617722", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617722" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319757", "reference_id": "319757", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319757" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:2.10.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:netpbm:netpbm:2.10.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netpbm:netpbm:2.10.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2471", "reference_id": "CVE-2005-2471", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2471" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:743", "reference_id": "RHSA-2005:743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:743" }, { "reference_url": "https://usn.ubuntu.com/164-1/", "reference_id": "USN-164-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/164-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931752?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-9?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-9%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931747?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931745?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931750?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931748?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931749?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2005-2471" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u4te-rujr-x7ek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84606?format=api", "vulnerability_id": "VCID-zezh-euwy-9ka7", "summary": "netpbm: Null pointer dereference in stringToUint function", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2586.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2586.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2586", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30377", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30406", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30451", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30259", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30319", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30353", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30356", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30312", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30265", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00116", "scoring_system": "epss", "scoring_elements": "0.30279", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2586" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419539", "reference_id": "1419539", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1419539" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/931755?format=api", "purl": "pkg:deb/debian/netpbm-free@0?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@0%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931747?format=api", "purl": "pkg:deb/debian/netpbm-free@2:10.0-15.4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:10.0-15.4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931745?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.01.00-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931750?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.10.02-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.10.02-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931748?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/931749?format=api", "purl": "pkg:deb/debian/netpbm-free@2:11.13.03%2Bds-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.13.03%252Bds-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2017-2586" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zezh-euwy-9ka7" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/netpbm-free@2:11.01.00-2%3Fdistro=trixie" }